Ascot Group is seeking a Cybersecurity Defense SOC Analyst (L2) to enhance their 24x7 Cybersecurity Defense function in Chicago. The role involves investigating security incidents, improving detection content, and supporting incident response activities.
Job Description This is an opportunity to join Ascot Group - one of the world’s preeminent specialty risk underwriting organizations. Designed as a modern-era company operating through an ecosystem of interconnected global operating platforms, we’re bound by a common mission and purpose: One Ascot. Our greatest strength is a talented team who flourish in a collaborative, inclusive, and entrepreneurial culture, steeped in underwriting excellence, integrity, and a passion to find a better way, The Ascot Way. The Ascot Way guides our people and our organization. Our underwriting platforms collaborate to find creative ways to deploy our capital in a true cross-product and cross-platform approach. These platforms work as one, deploying our capital creatively through our unique Fusion Model: Client Centric, Risk Centric, Technology Centric. Built to be resilient, Ascot maximizes client financial security while delivering bespoke products and world class service — both pre- and post-claims. Ascot exists to solve for our clients’ brightest tomorrow, through agility, collaboration, resilience, and discipline. Job Summary As part of our 24x7 Cybersecurity Defense function, the SOC Analyst (L2) will be responsible for investigating security incidents, improving detection content and supporting the overall monitoring, detection and cybersecurity incident response activities. This involves working closely with the members of the internal Cybersecurity team and our Managed Security Service Provider (MSSP). Acting as an escalation point for L1/L2 SOC analysts, this resource will work within an expanding cybersecurity team, collaborating with cybersecurity managers, IT Infrastructure, and Deskside Support Teams. You must be detail-oriented, diligent, and capable of managing multiple aspects of the incident response lifecycle simultaneously. You will be supporting a 24X7 Cybersecurity Defense function and will be required to work in shifts that will vary based on operational needs to support the global footprint across the UK and US time zones. This resource will additionally be responsible for maintaining detection content on the detection tool, (detection rules, log ingestion, parsers, forwarders), maintaining playbooks, SOC documentation and supporting integrations and log sources associated with the overall Cybersecurity Defense solution. This role will be in the office with a hybrid work schedule. Responsibilities • Monitor our security tools to triage and respond to suspicious events and abnormal activities, capable of performing deep-dive incident investigations. • Serve as a point of escalation for the L1, L2 SOC Analysts, and the point of contact for our MSSP, coordinating response efforts with other groups and stakeholders with varying technical expertise, such as IT, Legal, business etc. • Develop and implement advanced security protocols and incident response procedures and improve our threat intelligence processes. • Stay current with evolving threats, vulnerabilities, tools, technologies and threat actor TTPs to help improve detection and response capabilities. • Provide oversight and governance over the daily operations of the MSSP and SOC team at a global level. • Mentor and provide training to junior SOC team members. • Develop and refine standard operating procedures in the form of run books and playbooks for incident response and threat detection. Create and make improvements to procedures and playbooks. Conduct technical analysis, log reviews, and assessments of cybersecurity incidents throughout the incident management lifecycle. • Work with end users where appropriate on security related incident and request workflow. • Document and manage incident cases to utilize information for stakeholder engagement to provide insight, intelligent recommendations, risk reporting and lessons learned. • Work in scheduled shift patterns when required. • Conduct in-depth security investigations, log analysis, network/email traffic assessment, and evaluate other data sources to identify root causes, assess impact, and gather evidence for response and mitigating actions. • Implement detection use cases within our SIEM for our expanding estate using appropriate scripting languages. • Manage log sources, log ingestion volumes, detection content and overall SIEM solution system health, maintenance, and upgrades. • Assist with additional ad hoc projects as required. Requirements • Cybersecurity related bachelor’s degree or related field. • Minimum of 8 years of experience in a security operations role, SOC engineering and or a cybersecurity technical engineering role. • Exposure to building and migrating log sources onto a new SIEM platform, creating detection content, log parsers and detection engineering will be preferred. Alternatively, candidates that have worked in senior technical roles in a Managed Security Service Provider (MSSP) will be preferred. • Preference will be given to candidates who also have additional technical and cybersecurity certifications covering both defensive and offensive security such as CompTIA Security+, Certified SOC Analyst (CSA), Certified Ethical Hacker (CEH), CySA+, CISSP, GSEC, GCIH, CCSP, Microsoft SC-200, CISSP-ISSMP, CTIA, OSCP. • Candidates must have solid experience and knowledge of typical enterprise technologies. On-premises and cloud hosting, Windows and Linux operating systems (OS), Microsoft Azure, M365 and the ability to detect signs of compromise in these systems. • Possess a growth mindset and is willing to learn how to resolve technical security issues. • Demonstrate a working and genuine interest and talent in Cybersecurity. • Demonstrate detail orientation and can take a structured approach to procedures and working instructions. • Work and maintain a calm structured mindset even when under pressure. • Possess an aptitude for understanding and analyzing data when troubleshooting. • Strong written communication, critical thinking, and analysis skills, including the ability to present potential risks and actual findings to a wide audience. Ability to communicate complex problems to a non-technical audience. • Must have a working understanding of key security concepts and attack types such as phishing, malware, vulnerabilities, Cyber Kill Chain, and attack stages. • A strong analytical mindset, capable of digesting a wide range of information to make practical judgements based on available data and context. • Experience with security tools and technologies, including SIEM, intrusion detection systems, EDR, XDR, log analysis, and malware analysis. • Understand threat actor tactics, techniques and procedures, have familiarity with the MITRE-ATT&CK Framework and different stages of an attack lifecycle. • Maintain a desire to keep learning, with a curious and creative growth mindset. • **This position may be filled at a different level, depending on experience*** Compensation Actual base pay could vary and may be above or below the listed range based on factors including but not limited to experience, subject matter expertise, and skills. The base pay is just one component of Ascot’s total compensation package for employees. Other rewards may include an annual cash bonus and other forms of discretionary compensation awarded by the Company. The salary range for this role in the NY Metro and Chicago, IL area is $105,000 – $120,000. Company Benefits The Company provides a competitive benefits package that includes the following (eligibility requirements apply): Health and Welfare Benefits: Medical (including prescription coverage), Dental, Vision, Health Savings Account, Commuter Account, Health Care and Dependent Care Flexible Spending Accounts, Life Insurance, AD&D, Work/Life Resources (including Employee Assistance Program), and more Leave Benefits: Paid holidays, annual Paid Time Off (includes paid state /local paid leave where required), Short-term Disability, Long-term Disability, Other leaves (e.g., Bereavement, FMLA, Adoption, Maternity, Military, Primary & Non-Primary Caregiver) Retirement Benefits: Contributory Savings Plan (401k) #L1 Hybrid
Join Ascot Group as a Cybersecurity Defense SOC Analyst (L2) in New York, where you'll investigate security incidents and enhance detection capabilities in a collaborative cybersecurity team. This role requires a detail-oriented professional with extensive experience in security operations and incident response.
Accenture is seeking a Low Code / Power Platform Analyst to design, build, and maintain low-code solutions using Microsoft technologies. The role involves collaborating with stakeholders to automate processes and enhance business operations.
Eccalon, LLC is seeking a Compliance Security and Microsoft Cloud Analyst to enhance cybersecurity compliance and cloud security engineering. This role focuses on DoD frameworks and Microsoft Azure Government and M365 GCC High security controls.
Ascot Group is seeking a Cybersecurity Defense SOC Analyst (L2) to enhance their 24x7 Cybersecurity Defense function in Chicago. The role involves investigating security incidents, improving detection content, and supporting incident response activities.
Amentum is seeking a Senior Cybersecurity Engineer focused on Incident Management to protect assets from cyber threats. This remote role involves technical expertise in Cloud Security and Endpoint Security.
Amentum is seeking a Senior Cybersecurity Engineer focused on Incident Management to protect assets from cyber threats. This remote role involves monitoring, incident response, and implementing security controls.
Join Ascot Group as a Cybersecurity Defense SOC Analyst (L2) in New York, where you'll investigate security incidents and enhance detection capabilities in a collaborative cybersecurity team. This role requires a detail-oriented professional with extensive experience in security operations and incident response.
Accenture is seeking a Low Code / Power Platform Analyst to design, build, and maintain low-code solutions using Microsoft technologies. The role involves collaborating with stakeholders to automate processes and enhance business operations.
Eccalon, LLC is seeking a Compliance Security and Microsoft Cloud Analyst to enhance cybersecurity compliance and cloud security engineering. This role focuses on DoD frameworks and Microsoft Azure Government and M365 GCC High security controls.
Ascot Group is seeking a Cybersecurity Defense SOC Analyst (L2) to enhance their 24x7 Cybersecurity Defense function in Chicago. The role involves investigating security incidents, improving detection content, and supporting incident response activities.
Amentum is seeking a Senior Cybersecurity Engineer focused on Incident Management to protect assets from cyber threats. This remote role involves technical expertise in Cloud Security and Endpoint Security.
Amentum is seeking a Senior Cybersecurity Engineer focused on Incident Management to protect assets from cyber threats. This remote role involves monitoring, incident response, and implementing security controls.
Join Ascot Group as a Cybersecurity Defense SOC Analyst (L2) in New York, where you'll investigate security incidents and enhance detection capabilities in a collaborative cybersecurity team. This role requires a detail-oriented professional with extensive experience in security operations and incident response.
Accenture is seeking a Low Code / Power Platform Analyst to design, build, and maintain low-code solutions using Microsoft technologies. The role involves collaborating with stakeholders to automate processes and enhance business operations.
Ascot Group is seeking a Cybersecurity Defense SOC Analyst (L2) to enhance their 24x7 Cybersecurity Defense function in Chicago. The role involves investigating security incidents, improving detection content, and supporting incident response activities.