Perform deep-dive investigations to determine root cause, scope, and impact of incidents.
Apply MITRE ATT&CK and other frameworks for adversary TTP identi?cation.
Conduct kill-chain and supply chain analysis to understand and counter threats.
Coordinate and direct complex incident response activities.
Guide preparation, identi?cation, containment, eradication, and recovery actions in collaboration with SOC, forensics, and engineering teams.
Serve as the primary escalation point for high-impact or advanced incidents.
Ensure incident handling aligns with established guidelines, response plans, and playbooks.
Conduct proactive threat hunting to identify emerging risks.
Analyze telemetry, logs, and behavioral patterns for indicators of compromise or attack.
Hunt for advanced persistent threats and undiscovered vulnerabilities.
Use advanced queries in SOC cybersecurity tools to detect anomalous or suspicious activity.
Work with forensic teams to ensure proper forensic collection, preservation, and analysis of digital evidence.
Coordinate with forensics teams to ensure chain-of-custody and evidence integrity.
Extract and analyze relevant artifacts to support investigations and post-incident reviews.
Document and communicate forensic ?ndings to stakeholders.
Develop and enhance SOC processes, playbooks, and detection capabilities.
Re?ne detection rules, alert thresholds, and automation work?ows in SIEM/SOAR platforms and other cybersecurity tools.
Create SOPs, knowledge base articles, and training materials for SOC sta?.
Recommend and guide implementation of new detection and analysis tools.
Perform threat intelligence collection, analysis, and dissemination.
Gather threat data from internal, classi?ed, and open-source intelligence feeds.
Analyze and @contextualize intelligence to produce actionable recommendations.
Share relevant threat information with SOC, leadership, and partner teams.
Mentor and train SOC analysts to improve investigative capabilities and analytical thought process.
Provide real-time guidance during active incidents.
Conduct regular training sessions, tabletop exercises, and red/blue team drills.
Validate analyst ?ndings and provide feedback to designed to provoke thought, improve accuracy, and investigative thoroughness.
Collaborate with stakeholders to strengthen overall cybersecurity posture.
Work with engineering, IT, and cloud teams to address identi?ed vulnerabilities.
Participate in tool evaluations, recommending solutions that enhance SOC capabilities and identify capability overlap.
Support internal coordination with DEA sections, divisions, and external entities.
Maintain documentation and reporting for SOC operations.
Record investigative steps, evidence, and incident timelines in case management systems.
Generate incident reports, trend analyses, and post-mortem summaries.
Provide executive-level brie?ngs on security events and SOC performance.
Powered by JazzHR