• Competitive
  • Singapur, Singapore
  • Festanstellung, Vollzeit
  • OCBC Bank
  • 20 Sep 17

SOC Analyst (Command Centre – Cyber Security Operations Centre)

SOC Analyst (Command Centre – Cyber Security Operations Centre)

SOC Analyst Tier 1 performs 24X7 monitoring using alerts from cyber defence tools such as intrusion detection system alerts, and end-point security monitoring alerts. SOC Analyst determines which security issues may have an impact on the organisation. They provide initial evaluation and escalation of incidents to Tier 2s. SOC Analysts may be tasked to perform initial / basic containment of incidents and deliver reports. Normally has 0 to 2 or more years of experience in cyber defence or a related field.

Qualifications
1 Knowledge of common network tools (e.g., ping, trace route, ns lookup)
2 Knowledge of cyber defence policies, procedures, and regulations
3 Knowledge of different types of network communication (e.g., Local Area Network [LAN], Wide Area Network [WAN], Metropolitan Area Network [MAN], Wireless Wide Area Network [WWAN], Wireless Local Area Network [WLAN])
4 Knowledge of SIEM, Intrusion Detection System (IDS) tools and applications
5 Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution)
6 Knowledge of vulnerability assessment tools, including open source tools, and their capabilities
7 Knowledge of incident response and handling methodologies
8 Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
9 Knowledge of the cyber defence service provider reporting structure and processes within one's own organization
10 Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)Language/Structured Query Language [PL/SQL]
11 Ability to interpret and incorporate data from multiple tool sources
12 Knowledge of file extensions (e.g. .dll, .bat, .zip, .pcap, .gzip)
13 Knowledge of the common attack vectors on the network layer
14 Skill in reading and interpreting signatures (e.g., Snort)
15 Knowledge of web filtering technologies
16 Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies
17 Knowledge of host/network access controls (e.g., access control list)
18 Knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Dynamic Host Configuration Protocol [DHCP]) and directory services (e.g., Domain Name System [DNS])
19 Knowledge of the common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communications
20 Knowledge of Windows command line (e.g., ipconfig, netstat, dir, nbtstat)
21 Knowledge of Defence-in-depth principles and network security architecture
22 Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Open System Interconnection model [OSI], Information Technology Infrastructure Library [ITIL])
23 Knowledge of signature implementation impact
24 Skill in recognizing and categorizing types of vulnerabilities and associated attacks
25 Skill in detecting host and network-based intrusions via intrusion detection technologies

*LI-EL