LOG IN
SIGN UP
Tech Job Finder - Find Software, Technology Sales and Product Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
First name
Last name
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

SOC Analyst

at Fortinet

Back to all Cybersecurity jobs
Fortinet logo
Industry not specified

SOC Analyst

at Fortinet

Mid LevelNo visa sponsorshipCybersecurity

Posted 9 hours ago

No clicks

Compensation
$117,000 – $143,000 USD

Currency: $ (USD)

City
Not specified
Country
United States

Join Fortinet’s FortiCloud SOC-as-a-Service team as a Security Operations Centre (SOC) Analyst. You will monitor security events, detect threats, assess risks, and work with customers globally to improve their security posture, following a follow-the-sun schedule (5 days/40 hours with one weekend). Responsibilities include triaging alerts, leveraging threat intelligence, creating reports and detections, and assisting with incident containment and remediation, while improving playbooks and automation. Strong collaboration with customers and forensic teams is required.

Location: Sunnyvale, CA, United States

Fortinet is looking for a Security Operations Centre (SOC) Analyst to be part of the FortiCloud SOC-as-a-Service team. This is a highly technical role, monitoring security events, identifying threats, assessing risks, and working with customers globally to improve their security posture.

FortiCloud SOC-as-a-Service team operates based on a follow the sun approach. Working hours for this position includes 5 days/40 hours per week, consisting of 1 weekend and 4 weekdays (e.g. Sunday – Thursday or Tuesday – Saturday), 8am – 4pm.

Responsibilities:

  • Monitor SOC alerts to detect potential threats
  • Use threat intelligence feeds, triage alerts and filter out false-positives 
  • Create custom reports, dashboards, and execute log searches to support investigations and customer’s requirements
  • Work with customers and Forensic analysis team to contain and eradicate incidents if need be
  • Follow Incident Response playbooks, processes and procedures and help to improve them
  • Create/Update use case detections to detect new threats from raw logs
  • Create/Update playbooks to automate repetitive triage steps

Requirements:

  • Understanding of SOC operations and Incident Response Life cycle.
  • Understanding of Cyber Kill chain, threat vectors and threat intelligence
  • Understanding of layered security at data, OS and network levels
  • Understanding Cybersecurity Frameworks
  • Hands-on experience with security log analysis such as  AV, IPS, Anti-Spam logs
  • Hands-on experience with visualization, reporting technologies
  • Hands-on experience with PostgreSQL, regular expressions
  • Hands-on experience with Network Security technologies such as Firewalls, SIEM, Sandbox
  • Hands-on experience with Linux and Windows system administration.
  • Previous working experience with Fortinet products is a bonus.
  • Team player, solution-focused, conflict management skills
  • Self-directed, takes initiatives
  • Open to new challenges and learning opportunities
  • Understands the importance of discipline, consistency and communication
  • Good verbal and written communication skills
  • Cybersecurity certifications such as GCIA, GCIH, GMON, GSOC, CEH, Security+ is a bonus
  • Graduates from IT degrees, or mid-career IT professionals with certifications in cybersecurity may apply

 

Fortinet is an equal opportunity employer. We will only notify shortlisted candidates. Fortinet will not entertain any unsolicited resumes, please refrain from sending them to any Fortinet employees or Fortinet email aliases. Should any Agency submit any resumes to Fortinet, these resumes if considered, will be assumed to have been given by the Agency free of any related fees/charges.

 

Fortinet offers employees a variety of benefits, including medical, dental, vision, life and disability insurance, 401(k), 11 paid holidays, vacation time, and sick time as well as a comprehensive leave program. 

Wage ranges are based on various factors including the labor market, job type, and job level. On target earnings for this position is expected to be $117,000 - $143,000 per year. Exact salary offers will be determined by factors such as the candidate's subject knowledge, skill level, qualifications, experience, and geographic location.

All roles are eligible to participate in the Fortinet equity program, and this position is also eligible for commissions based on the terms of the Sales Compensation Plan

SOC Analyst

at Fortinet

Back to all Cybersecurity jobs
Fortinet logo
Industry not specified

SOC Analyst

at Fortinet

Mid LevelNo visa sponsorshipCybersecurity

Posted 9 hours ago

No clicks

Compensation
$117,000 – $143,000 USD

Currency: $ (USD)

City
Not specified
Country
United States

Join Fortinet’s FortiCloud SOC-as-a-Service team as a Security Operations Centre (SOC) Analyst. You will monitor security events, detect threats, assess risks, and work with customers globally to improve their security posture, following a follow-the-sun schedule (5 days/40 hours with one weekend). Responsibilities include triaging alerts, leveraging threat intelligence, creating reports and detections, and assisting with incident containment and remediation, while improving playbooks and automation. Strong collaboration with customers and forensic teams is required.

Location: Sunnyvale, CA, United States

Fortinet is looking for a Security Operations Centre (SOC) Analyst to be part of the FortiCloud SOC-as-a-Service team. This is a highly technical role, monitoring security events, identifying threats, assessing risks, and working with customers globally to improve their security posture.

FortiCloud SOC-as-a-Service team operates based on a follow the sun approach. Working hours for this position includes 5 days/40 hours per week, consisting of 1 weekend and 4 weekdays (e.g. Sunday – Thursday or Tuesday – Saturday), 8am – 4pm.

Responsibilities:

  • Monitor SOC alerts to detect potential threats
  • Use threat intelligence feeds, triage alerts and filter out false-positives 
  • Create custom reports, dashboards, and execute log searches to support investigations and customer’s requirements
  • Work with customers and Forensic analysis team to contain and eradicate incidents if need be
  • Follow Incident Response playbooks, processes and procedures and help to improve them
  • Create/Update use case detections to detect new threats from raw logs
  • Create/Update playbooks to automate repetitive triage steps

Requirements:

  • Understanding of SOC operations and Incident Response Life cycle.
  • Understanding of Cyber Kill chain, threat vectors and threat intelligence
  • Understanding of layered security at data, OS and network levels
  • Understanding Cybersecurity Frameworks
  • Hands-on experience with security log analysis such as  AV, IPS, Anti-Spam logs
  • Hands-on experience with visualization, reporting technologies
  • Hands-on experience with PostgreSQL, regular expressions
  • Hands-on experience with Network Security technologies such as Firewalls, SIEM, Sandbox
  • Hands-on experience with Linux and Windows system administration.
  • Previous working experience with Fortinet products is a bonus.
  • Team player, solution-focused, conflict management skills
  • Self-directed, takes initiatives
  • Open to new challenges and learning opportunities
  • Understands the importance of discipline, consistency and communication
  • Good verbal and written communication skills
  • Cybersecurity certifications such as GCIA, GCIH, GMON, GSOC, CEH, Security+ is a bonus
  • Graduates from IT degrees, or mid-career IT professionals with certifications in cybersecurity may apply

 

Fortinet is an equal opportunity employer. We will only notify shortlisted candidates. Fortinet will not entertain any unsolicited resumes, please refrain from sending them to any Fortinet employees or Fortinet email aliases. Should any Agency submit any resumes to Fortinet, these resumes if considered, will be assumed to have been given by the Agency free of any related fees/charges.

 

Fortinet offers employees a variety of benefits, including medical, dental, vision, life and disability insurance, 401(k), 11 paid holidays, vacation time, and sick time as well as a comprehensive leave program. 

Wage ranges are based on various factors including the labor market, job type, and job level. On target earnings for this position is expected to be $117,000 - $143,000 per year. Exact salary offers will be determined by factors such as the candidate's subject knowledge, skill level, qualifications, experience, and geographic location.

All roles are eligible to participate in the Fortinet equity program, and this position is also eligible for commissions based on the terms of the Sales Compensation Plan

SIMILAR OPPORTUNITIES

No similar jobs available at the moment.