SOC Analyst

Managed Services Cincinnati, Ohio


SOC Analysts at RoundTower monitor customer environments and perform Incident Detection, Validation, and Incident Reporting. SOC Analysts are the frontline of SOC and are customer-facing representatives. SOC Analysts are responsible for triaging events, incidents, and reporting validated incidents to the customer for incident response.  Incumbents will possess strong technical and analytical skills while providing accurate analysis of security related problems.  They have a well-rounded networking background and are responsible for performing troubleshooting of customer issues.  This individual is user focused and works to resolve client needs in a timely manner.  These needs may involve resolving hardware/software failures, investigating and responding to security threats, and making change request to the security policy of company devices.

The SOC Analyst Tier II is expected to monitor security feeds streaming from client servers, network devices, and end user workstations, operate and maintain network security equipment at client locations.  The Analyst is expected to be familiar with a wide range of security tools and understand basic security fundamentals. The Analyst will perform information security event analysis and must possess knowledge of operating systems, TCP/IP networking, network attacks, attack signatures, defense countermeasures, vulnerability management, and log analysis.

Role and Responsibilities:

  • Monitor and analyze network traffic and alerts
  • Investigate intrusion attempts and perform in-depth analysis of exploits
  • Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident
  • Conduct proactive threat research
  • Review security events that are populated in a Security Information and Event Management (SIEM) system
  • Tuning of rules, filters and policies for detection-related security technologies to improve accuracy and visibility
  • Data mining of log sources to uncover and investigate anomalous activity, along with related items of interest
  • Independently follow procedures to contain analyze and eradicate malicious activity
  • Document all activities during an incident and provide leadership with status updates during the life cycle of the incident
  • Incident management, response, and reporting
  • Provide information regarding intrusion events, security incidents, and other threat indications and warning information to the client
  • Track trends, statistics, and key figured for each assigned client
  • Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions
  • Reporting
  • Incident reports
  • Security status reports
  • Client-facing security meetings

Position Requirements:

  • Incident handling/response experience
  • Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles
  • Understanding of and a strong desire to learn common security technologies (IDS, Firewall, SIEM, etc.)
  • The ability to think creatively to find elegant solutions to complex problems
  • Excellent verbal and written communication skills
  • The desire to work both independently and collaboratively with a larger team
  • A willingness to be challenged along with a strong appetite for learning
  • 2-4 years of experience in Information Security, Incident Response, etc. (or related field)
  • Hands-on experience with common security technologies (IDS, Firewall, SIEM, etc.)
  • Knowledge of common security analysis tools & techniques
  • Understanding of common security threats, attack vectors, vulnerabilities and exploits
  • Knowledge of regular expressions


  • Bachelors Degree in Computer Science, Information Security or related/equivalent educational or work experience
  • One or more of the following certifications: CISSP, GCIA, Security+, CEH, ACSE