Founded by mathematicians and cyber defense experts in 2013, Darktrace is a global leader in cyber security AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption. We protect more than 9,000 customers from the world’s most complex threats, including ransomware, cloud, and SaaS attacks.
Our roots lie deep in innovation. The Darktrace AI Research Centre based in our Cambridge, UK headquarters, has conducted research establishing new thresholds in cyber security, with technology innovations backed by over 130 patents and pending applications.
For more information on our cutting-edge technology, visit darktrace.com.
We are seeking a Federal Junior Security Operations Center (SOC) Analyst to join our talented security team. This role is perfect for a motivated individual with a passion for cybersecurity, critical thinking, and problem-solving. The ideal candidate will have at least 2 years of relevant experience in cybersecurity, strong technical skills, and the ability to work effectively in a team. The primary function of this position is to participate with identification, investigations and reporting on cyber threats.
Key Responsibilities:
- Usage of the Darktrace suite of products, as well as FEDRAMP approved EDR/NDR/XDR, vulnerability scanning, and SIEM security tooling.
- Monitor and analyze Security Information and Event Management (SIEM) alerts to identify security issues for remediation and investigate events and incidents.
- Collaborate with senior analysts and other team members to develop and implement effective security strategies.
- Assist in the creation and maintenance of runbooks and Standard Operating Procedures (SOPs).
- Participate in on-call shifts as needed to ensure 24/7 coverage of security operations.
- Investigate, document, and report on information security issues and emerging trends.
- Communicate security issues and incidents to relevant stakeholders clearly and effectively.
- Stay updated with the latest cybersecurity trends, threats, and technology.
- Contribute to a positive team culture and help mentor junior team members.
- US Citizenship is required, and the candidate must be able to obtain a security clearance.
Qualifications:
- At least 2 years of relevant experience in cybersecurity.
- Certifications such as CompTIA Security+, Certified Ethical Hacker (CEH) are required.
- Familiarity with security tools (Vulnerability Management, SIEM, Endpoint Security, Web proxies such as Splunk, Microsoft Defender, Nessus, and Trend Micro.
- Knowledge of OSINT tools like VirusTotal, various Sandboxes, various Malware Analysis
- Familiarity with cloud computing technologies including AWS and Azure
- Experience coordinating incident response efforts, assisting with classifying security events, support documentation and reporting deliverables.
- Strong critical thinking and problem-solving skills.
- Excellent communication skills, written and verbal.
- Ability to work in a team-oriented environment and collaborate with others.
- Fast-learner with the ability to adapt to new challenges and technologies quickly.
- Hardworking and dedicated to continuous improvement.
- Availability for on-call shifts as required.
Preferred Skills:
- Experience in a Security Operations Center (SOC) environment working as an Incident Responder/Coordinator or analyst.
- Knowledge of network security, endpoint security, and threat intelligence.
- Experience in creating runbooks or SOPs are a plus.
- Proactive and enthusiastic about cybersecurity with ability to work with moderate supervision.
Benefits
- 100% medical, dental and vision insurance, plus dependents
- Paid parental leave
- Pet insurance
- Life insurance
- Commuter benefits
- Employee Assistance Program
#LI-hybrid