About Ekco
Founded in 2016, Ekco is now one of the fastest growing cloud solution providers in Europe! We specialise in enabling companies to progress along the path of cloud maturity, managing transformation and driving better outcomes from our clients’ existing technology investments.
In a few words, we take businesses to the cloud and back! We have over 1000 highly talented and supportive colleagues (and counting) across a number of regional offices in the UK, Benelux & Ireland.
The role
Reporting to the regional Security Operations Lead, the role of the SOC Analyst is to apply the understanding of investigative techniques and analytical skills to defend against and respond to cybersecurity events and incidents in our client’s IT environments.
You will support clients by ensuring they remain secure. You will work as part of a team to deliver monitoring and protection in both a reactive and proactive manner. You will also be responsible for rolling out security tools including creating documentation.
SOC Analysts at Ekco are operationally focused; they secure and monitor systems using advanced toolsets to prevent security breaches and to respond to incidents as they arise.
Day to day your role will involve:
1. Performing accurate and precise real-time analysis and correlation of logs/alerts from a multitude of client systems.
2. Analysing and assessing security incidents and advancing to client resources or collaborating with internal teams for additional assistance.
3. Determining if events constitute security incidents e.g.: security events and incidents from SIEM, Firewall (FW), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Antivirus (AV), Directory Servers, Network Access Control (NAC) and other client data sources.
4. Assigning and escalating tickets in accordance with defined SLA’s.
5. Recommending tuning for security engineers to develop/adjust SIEM rules and reduce false positives.
6. Raising incidents to appropriate Seniors or Incident Response for major security issues.
7. Recognising potential, successful, and unsuccessful intrusion attempts and compromises through reviewing and analysing relevant event detail and summary information.
8. Monitor identity and access management, including monitoring for abuse of permissions by authorised system users.
9. Participate in cyber-security exercises and training – Blue-Teaming.
10. Deliver best in class customer service, communicating with clients frequently.
11. Responding to inbound requests via phone, emails or tickets.
12. Documenting actions in cases to effectively communicate information internally and to client.
13. Reporting common and repeat problems (trend analysis) to management and propose process and technical improvements.
14. Providing cover in line with rotating shift patterns. You should be flexible to rotating 12 hour shifts. We provide 24/7 cover to clients and shifts are allocated accordingly.
15. Performing other duties as assigned.
About You
1. A Bachelor’s degree or equivalent in Computer Science, Computer Engineering, Electrical Engineering, Network Security, Information Security, Information Technology, or Mathematics (or equivalent work experience).
2. Prior experience working as a SOC Analyst, preferably in a MSSP environment.
3. Keen problem solving/troubleshooting skills.
4. Strong analytical skills and a logical approach to resolving issues.
5. A can-do attitude.
6. Excellent written and verbal communication skills. You should be able to communicate technical details clearly.
7. The ability to adjust and adapt to changing priorities in a dynamic environment.
8. A pro-active approach to addressing issues and requests and the ability to multitask.
9. The ability to learn new technologies and concepts quickly.
10. Great organisational skills and attention to detail.
11. Adaptability to do a range of work, including the complex, non-routine, mundane and multi-environment.
12. Able to work under direction, use discretion and determine when to escalate issues.
13. Effective communication, teamwork and task-time management skills.
Desirable:
1. Prior experience working with SIEM and EDR – E.g. SentinelOne, Microsoft security stack (Defender, Sentinel).
2. Industry recognized certifications – E.g. CompTIA Security+, CySA+, Microsoft SC-200, SBT L1/L2 etc.
3. Theoretical or practical knowledge in the following areas: Unix, Linux, Windows, etc. operating systems.
4. Mitre ATT&CK framework and adversary Tactics, Techniques and Procedures (TTPs).
5. Intrusion analysis.
6. Creation/tuning of detection analytics.
7. Exploits, vulnerabilities, network attacks.
Benefits/Perks
1. Time off - 25 days leave + public holidays.
2. x1 day Birthday leave per year.
3. Company Pension Scheme (employer contribution 5%) + flexible salary sacrifice.
4. Employee Assistance Programme (EAP) - access to dedicated mental health, emotional wellbeing and general advice.
5. EkcOlympics - a global activity for fun!
6. Learning & development - Unlimited access to Pluralsight learning platform.
7. A lot of responsibilities & opportunities to grow (also internationally).
Why Ekco
1. Microsoft’s 2023 Rising Star Security Partner of the year.
2. VMware & Veeam top partner status.
3. Ranked as 4th fastest growing technology company in the Deloitte Fast50 Awards.
4. Ekco are committed to cultivating an environment that promotes diversity, equality, inclusion and belonging.
5. We recognise the value of internal mobility and encourage opportunities for internal development & progression.
6. Flexible working with a family friendly focus are at the core of our company values.
#J-18808-Ljbffr