Security Operation Center Analyst 

Tampa, Florida | Direct Hire

To Apply for this Job Click Here

Security Operation Center Analyst 

Companies, investors and government entities around the world turn to Alvarez & Marsal (A&M) for leadership, action and results.? A&M’s leadership is about a bias towards action and the willingness to tell clients what we think is needed. Our restructuring heritage sharpens our ability to act decisively.? Clients select us for our deep expertise and ability to create and deliver practical, rather than theoretical, solutions to their unique problems in addition to our objectivity.?  

Privately held since its founding in 1983, A&M is a leading global professional services firm that provides advisory, business performance improvement and turnaround management services. When conventional approaches are not enough to create transformation and drive change, clients seek our deep expertise and ability to deliver practical solutions to their unique problems.  

With over 4,500 people across four continents, we deliver tangible results for corporates, boards, private equity firms, law firms and government agencies facing complex challenges. Our senior leaders, and their teams help companies act decisively, catapult growth and accelerate results. We are experienced operators, world-class consultants, former regulators and industry authorities with a shared commitment to telling clients what’s really needed for turning change into a strategic business asset, managing risk and unlocking value at every stage of growth.  

We are seeking a Security Operation Center (SOC) Analyst to join our Global Security Office (GSO) team. This position will report into the GSO SOC Manager and the job holder will be based out of the US. 


  • Responsible for working in a global 24×7 Security Operation Center (SOC) environment which consists of an in-house and outsourced SOC.  

  • Able to participate on an on-call rotation. 

  • Perform real-time alert monitoring and risk mitigation. 

  • Provide analysis and trending of security log data from a large number of heterogeneous security devices across different layers. 

  • Provide Incident Response (IR) support when analysis confirms actionable incident from the outsourced SOC and internal systems.  

  • Provide threat and vulnerability analysis as well as security advisory services. 

  • Analyze and respond to previously undisclosed software and hardware vulnerabilities. 

  • Investigate, document, and report on information security issues and emerging trends. 

  • Integrate and share information with other analysts and teams. 

  • Participate in security projects and assist network operations and engineering teams. 

  • Other tasks and responsibilities as assigned through ticketing system. 

Core Qualifications: 

  • Bachelor’s degree in a related field (Security, Forensics or Computer Science is preferred)  

  • At least 4 years of experience as a security analyst, incident handler/responder, security engineer or penetration tester.  

  • Excellent knowledge of security methodologies, processes (like Kill chain/diamond models and MITRE ATT&CK framework).  

  • Excellent knowledge of technical security solutions (firewalls, SIEM, NIDS/NIPS/HIDS/HIPS, AVs, DLP, proxies, network behavioral analytics, endpoint and cloud security). 

  • In depth knowledge of TCP/IP, UDP, DNS, FTP, SSH, SSL/TLS and HTTP Protocols, network analysis, and network/security applications. 

  • Very good knowledge of common malware threats and attack methodologies. 

  • Professional Certifications: GCIA, GCIH, GCFE, GCFA, Security+, CCNA CyberOps, OSCP, GPEN, GWAPT, CEH, CISSP or other equivalent certifications are highly desirable.  

Core Competencies: 

  • Accountable for successful completion of multiple, individual projects simultaneously. 

  • Communicate effectively by contributing significantly to the development and delivery of a variety of written and visual documents for diverse audiences. 

  • Manage change and demonstrate adaptability by embracing change and adjusting priorities or processes and approach as needs dictate. 

  • Work independently as a team representative in the allocated region as well as show excellent teamwork skills.  

  • Ability to develop thorough documentation and operational playbooks in addition to suggest alert enhancements to improve detection capability. 

  • Experienced in working with external vendors and third parties. 

  • Good understanding of system and network hardening practices

To Apply for this Job Click Here

Apply Now

Related Opportunities

Sorry, we couldn't find any posts. Please try a different search.