Attack Monitoring Analyst (GSOC) - London Stock Exchange Group
ROLE PROFILE: The London Stock Exchange Group seeks an experienced, dedicated and driven Attack Monitoring Analyst to join the Global Security Operations team! ROLE SUMMARY: LSEGSecurity Operationsis a central function employingpeople, process and technology to continuously monitor and respond to cyber security incidents. This role is for an Attack Monitoring Analyst for the Global Security Operations Centre (GSOC). The role is responsible for identifying and responding to cyber security incidents and improving the defensive capabilities of the GSOC. The ideal candidate will have a solid technical background, with a firm understanding of modern attack techniques coupled with knowledge of the typical lifecycle of an attack. SHIFT: Role operates on a "follow-the-sun" shift rotation. Shifts are 1200hrs - 0000hrs (midday to midnight) London Time using a 4 days on, 4 days off rotation. RESPONSIBILITIES:
- Triage security events and employ a methodical and coherent response to security incidents adopting playbooks where necessary.
- Competently operate a chosen SIEM (e.g. Splunk/QRadar/LogRhythm) for incident investigations, or for the development of monitoring dashboards.
- Utilise playbooks, existing knowledge and accurate online resources for guidance when responding to incidents.
- Utilise online resources for researching and collecting threat intelligence to improve the SOC's abilities to detect cyber-attacks.
- Develop new, or improve existing run books and use cases based on investigations and knowledge of modern attacks.
- Stay up to date with current vulnerabilities, attacks, and countermeasures.
- Identify, respond and remediate cyber events generated through monitoring technologies.
- Preferred experience with operating or administrating a SIEM (e.g. Splunk/QRadar/LogRhythm).
- Solid understanding of networks including the TCP/IP stack, typical organisation architectures, and common protocols abused by malware.
- Experience in security event analysis & triage, incident handling and root-cause identification.
- Understanding of tools, techniques and procedures that attackers use to compromise organisations, ideally from direct experience.
- Knowledge of cyber security either academically or within corporate environments.
- Ability to work in a fast-paced and demanding environment while remaining calm.
- Strong verbal and written communication and collaboration skills.
- Security industry specific and core technical accreditations such as OSCP, GIAC, CCNA.
- Certification demonstrating SIEM operational competences.
- Proficient with one or more programming languages (e.g. Python, PowerShell, Java, C#).