Job Summary The SOC Analyst is responsible for administrating and supporting client’s operating system environments according to best practices, while ensuring high levels of system availability and performance, oriented to support Security Threat incidents. Responsibilities • Provide L1/L2 troubleshooting for operating system issues, hardware performance, security vulnerabilities, and other basic systems management tasks. • Understand services of Microsoft Windows Server OS, such as DHCP, DNS, AD, and CA. • Proactively ensure the highest level of systems and infrastructure availability. • Work with client application teams to resolve operating system, availability and performance related issues. • Monitor security, backup, and redundancy with systems according to predefined set of standards. • Work closely with and in support of the IT Service Desk, Engineering team and vendors to expedite issue resolution. • Review logs of events regularly depending on their organization/clients’ requirements. • Proper administration of assigned tickets including, documentation, updating, managing ticket performance. • Identify opportunities for alert reduction and automation. • Contribute to the enhancement of Standard Operational Procedure documentation. • Identify alert patterns and suggest solutions. • Properly identify, manage, prioritize and document security threat incidents. • Orchestrate the technical response across IT, OT, and cloud teams when a security incident occurs that exceeds high and critical thresholds. Skills And Experience • English – Spanish Language (Oral and writing 85 % or higher), (B2+ or above). • 1+ years of experience in related field preferred. • Basic knowledge of the ITIL framework. • Basic knowledge in infrastructure operations management, with knowledge in backup, antivirus, and patching. • Basic knowledge of Active Directory services. • Familiar with cloud computing concepts and basic operations. • Basic windows server administration (v. 2003-2019) with basic knowledge of networking and Linux. • Basic knowledge in virtualization technologies (eg. VMware). • Be familiar with Microsoft Office 365 & Email security applications. • Basic knowledge of Disaster recovery techniques. • Be familiar with Security Incident management • CompTia Security Plus or CCNA CyberOps Associate knowledge. Certified preferred. • Be familiar with security appliances and solutions such as IPS, IDS, Firewall, Alertlogic, FireMon or EDR solutions is preferred. • Be familiar with IT Security Auditing. • Be able to process logs from several different sources such as IDS/IPS, Network Equipment and/or Servers to correlate security incidents. • Be familiar with IT Security Standards such as NIST 800-53, CisControls, ISO-27000, is a plus. • Be familiar with GIAC Certified Incident Handler Certification (GCIH) or EC-Council Certified Incident Handler (E|CIH) • Excellent communications skills. • Flexible schedules. • Intermediate/advanced knowledge of security incident response management About Auxis Security Incident Response (SIR) Preferably have the certification EC-Council Certified Incident Handler (E|CIH) or similar
Job Type
Fulltime role
Skills required
No particular skills mentioned.
Location
Denver, Colorado
Salary
No salary information was found.
Date Posted
April 24, 2025
The SOC Analyst at Auxis is responsible for supporting clients' operating system environments and managing security threat incidents. This role involves troubleshooting, monitoring, and collaborating with various teams to ensure system availability and performance.