Threat Intelligence Analyst
VultrFull Time
Mid-level (3 to 4 years), Senior (5 to 8 years)
The SOC Analyst must be able to monitor and analyze logs and alerts to identify actionable security incidents. They should also be able to provide proactive threat hunting to detect incidents and provide Incident Response support when analysis confirms an actionable incident. Staying up to date on the latest emerging threats and tactics is also required. This role is for the night shift within the EMEA SOC, running from Sunday to Thursday, 8:00 PM to 04:30 AM.
The SOC Analyst will provide security monitoring and incident response of cyber security events. They will respond to SOC cybersecurity tickets sent or replied to by partners, investigating, documenting, and reporting on these tickets to ensure timeliness, uniformity, and compliance with documented processes and procedures. Issues or tickets will be escalated as deemed necessary by following documented procedures or verbally relayed communication.
Provides cybersecurity solutions and services
SonicWall provides advanced cybersecurity solutions to protect organizations from various cyber threats. Their product offerings include firewalls, secure remote access, email security, and advanced threat protection, all designed to safeguard networks, devices, and data from issues like ransomware, malware, and phishing attacks. SonicWall's products work by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules, ensuring that only safe data is allowed through. Unlike many competitors, SonicWall offers a comprehensive suite of security products along with subscription-based services that provide ongoing updates and support, which helps clients stay protected against evolving threats. The company's goal is to deliver essential security solutions to a diverse range of clients, including small to medium-sized businesses, enterprises, and government agencies, ensuring their safety in an increasingly digital world.