
Unix Shell scripts, Perl, Python, Powershell, C#, Go.
Experience with any of the following is a plus:.Entry to Intermediate skills in Windows, Linux, and/or OSX.
Be a primary for or support ongoing projects by assisting in the implementation, testing and documentation of security related projects.Takes on Security Operations responsibilities when not on a SOC shift: This includes but is not limited to documentation, basic malware analysis, exceptions tracking, security tool management, tuning, and configuration, along with metrics and reporting.
Ensure that we are implementing best practice security policies that address the client's business need while protecting their vital corporate assets. Makes recommendations, creates, modifies, and updates EDR and Security Information Event Management (SIEM) tool rules. Monitors and analyzes EDR and Security Information and Event Management (SIEM) to identify security issues for remediation. Maintains records of security events investigated and incident response activities, utilizing case management and ticketing systems. Threat Analysts will be part of a rotating SOC shift and will need to manage their schedule accordingly so as to ensure there is coverage during SOC shifts. Performs endpoint security monitoring, security event triage, and incident response for VMware Carbon Black customers, coordinates with other team members & management to document and report incidents. Threat Analysts have opportunities for mentorship from more senior members of the team, and involvement with maturing procedures, evaluating new security technologies, incident response, penetration testing, and the freedom to try out new ideas and technologies to improve the SOC.
This includes the following of procedures to triage and investigate security alerts, and escalate issues as necessary. Job description VMware Carbon Black Managed Detection Threat Analysts are responsible for monitoring and maintaining systems used in our security program.