L1 - SOC Analyst - Nightshift - Phoenix,AZ
GMI - Global Market Innovators - Scottsdale, AZ
Apply NowJob Description
L1 - SOC Analyst - Nightshift - Phoenix, AZ EOE Statement: We are an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status or any other characteristic protected by law. About the Organization: Join a team of exceptional people doing great things. GMI delivers secure technology solutions. More than a team of security or technology experts, we're what organizations today need - both. Savvy with security, network, collaboration, and cloud, we uniquely integrate technology smarts with security best practice, so customers thrive without taking on unnecessary or inadvertent risk. Driven by customer needs and with their best interests at heart, we build longstanding relationships that benefit all. As relentlessly focused as we are on serving our customers, we are equally committed to the success and growth of our people. Our philosophy is that everyone deserves a path to their highest potential and assisting team members in realizing their dreams improves life for everyone. We often promote from within and are proud to live our values: Exceeding Expectations; Admiring our People; Making a Difference. Description Title: SOC Analyst L1 Department: Managed SOC Classification: Full-time, Exempt Reports to: SOC Manager Manages: N/A Location: Hybrid Travel: On-Call: Yes PRIMARY FUNCTION The L1 SOC Analyst plays a pivotal role in delivering cutting-edge security services. This role demands not just technical prowess, but also exceptional communication, collaboration, and a passion for continuous self-development. The L1 SOC Analyst, by the direction of the SOC Manager and SOC Lead, will work closely with a team of highly skilled cyber experts, contributing to the analysis of security events and helping clients mitigate evolving threats. Operating with curiosity and innovation, the ideal candidate will strive to exceed expectations, ensuring a successful client outcome. PRIMARY RESPONSIBILITIES Security Event Analysis Investigate and analyze security events (alerts, logs, incidents) to provide actionable remediation strategies and clear, concise guidance. Able to think outside the box to tackle evolving threats, with a focus on delivering innovative and effective solutions. Collaborative Mindset Actively collaborate with internal teams and external clients, explaining complex security concepts in a way that's easy to understand and building trust in all interactions. Thrives in a team-oriented environment, bringing together cross-functional teams to solve complex problems. Exceptional Communicator: Able to translate complex technical information into clear, actionable steps for clients and internal teams. Self-Motivated Development: Continuously seek to expand your knowledge and expertise, passionate about personal growth, continuously learning, and pushing boundaries to stay ahead of the cybersecurity landscape. Root Cause Analysis Lead or assist in investigations to determine the underlying causes of security incidents, providing insights that help prevent future issues. Documentation & Knowledge Transfer Develop comprehensive documentation that reflects investigation or learning specifications, layered security strategies, and share your findings with peers and clients to foster learning. Mentorship and Growth Receive guidance from senior SOC members while also mentoring peers as you grow into a more advanced role. GENERAL REQUIREMENTS People are the most important part of GMI and the reason we are successful. The Analyst will: Demonstrate and promote an understanding and commitment to the GMI culture and core values. Build credibility with clients by setting and executing against expectations in line with managed scope. Maintain and proactively manage utilization target assigned by leadership. Ensure accurate project time reporting and accountability to project tasks. Speak fluently about GMI services and communicate business opportunities to the sales team. Identify and foster industry relationships to promote the GMI brand. Process is a foundational component of our service delivery and guides our team to success. The Analyst will: Review expectations committed to during the outlined processes, understand and manage any changes in expectations and manage them throughout the engagement, communicate and resolve exceptions with leadership. Collaborate with internal team members to drive client success through innovation, experience, and thought leadership. Continuously improve product and process through communication showing execution of experience. Continuously optimize internal GMI delivery "run-books" and internal delivery documentation. Technology expertise is why our customers trust GMI. The Analyst will: L1 SOC Analyst will work collaboratively and independently to triage potential incidents. Ability to research, analyze, and document findings, including root cause analysis. Provide advanced subject matter expertise, guidance, and recommendations to drive successful client outcomes. Implement and/or operate security technology solutions which include design development, integration plans, deliverable documentation, and knowledge transfer. Initiate research and formulate solutions without explicit direction. Receive technical mentoring by a senior member of the team. Execute a technology training regimen, overseen by a senior member of the team, to advance capabilities. Provide mentoring to peers. QUALIFICATIONS Education A bachelor's degree in CS, Math, Engineering, MIS, CIS or related field is preferred, but not required. Skills and Certification Vendor or industry technical certification(s) like: Google IT Certificate, Microsoft Certified: Security Operations Analyst, etc. CompTIA Security+, CEH, CYSA, CCNA, etc. Demonstrated skills in one or more of the following domains: Systems Administration - Windows or *nix. Windows Management technology - AD, GPO. Networking - OSI Model, Cisco, Checkpoint, Fortinet, Palo, etc. Network Analysis tool - Nmap, Net witness, Wireshark, etc. Identity Management SIEM - Elastic Stack, SentinelOne, Microsoft Sentinel, etc. Operating Systems - Server and Desktop, Windows, MAC, Linux. Security Solutions or Software Vulnerability management - CrowdStrike, Nessus, Rapid7, Burp Suite, etc. Knowledge and Experience A minimum of 2 years in relevant security education is required. Ability to develop and present technical material to all audience levels. Accountable self-starter with strong organizational and interpersonal skills. Excellent time management, prioritization, problem solving, and decision-making skills. Additional Information While performing the duties of this job, the employee is regularly required to stand, sit, talk, hear and use hands and fingers to operate a computer. Ability to sit at a computer terminal for an extended period. Light to moderate lifting is required. Reasonable accommodations may be made to enable individuals with disabilities to perform these functions. This position is currently accepting applications. #J-18808-Ljbffr
Created: 2025-03-08