Take Two Interactive Inc. is building out a Security Operations Center and is looking for a Sr. SOC Analyst who will play a crucial role in monitoring and responding to incidents in our various environments. The analyst will proactively hunt for threats, always with an eye towards improving alert quality, and automating response as applicable. This will also involve coordinating with various studio stakeholders across the organization. The analyst is expected to provide feedback and participate in the continuous improvement of the SOC.

• Perform security monitoring and incident response of cyber security events as part of a highly available Security Operation Center (SOC)
• Provide analysis and trending of security log data from a large number of heterogeneous security devices
• Detect incidents through proactive “hunting” analysis of security-relevant data sets
• Develop and follow detailed operational processes and procedures to appropriately analyze, escalate and assist in remediation of information security-related incidents

  • Prioritize multiple tasks and formulate responses/recommendations to internal and external stakeholders
  • Apply technical acumen and analytical capabilities to speed and enhance response
  • Optimize and tune security monitoring and detection rules and thresholds to improve fidelity of alerts
    • Leverage automation to improve workflow quality and efficiency as appropriate
    • Prioritize multiple tasks and formulate responses/recommendations to labels and team members in a fast-paced environment
    • Provide host and network forensic support to acquire system and network artifacts during security incident response
  • Understand and perform malware analysis during event and incident response investigations
  • Research new and evolving threats and vulnerabilities with potential to impact the monitored environment
  • Provide supervision, technical and procedural direction to other SOC Analysts
  • Must be willing to work various shifts and on-call availability
  • Travel up to 10%

• 5-7 years' experience as a Security/Cyber/Network Analyst

  • Direct experience in Security Operations Center work, Network Event Analysis, Threat Analysis, and/or Intelligence Analysis
    • Knowledge of various security methodologies and processes, and technical security solutions (firewall, packet analysis, SIEM and intrusion detection systems)
    • Ability to analyze endpoint, network, and application logs
    • Knowledge of common Internet protocols and applications
    • Sound problem resolution, judgment, negotiating, and decision-making skills
    • Strong work ethic and commitment to accomplish assigned tasks
    • Tenacity & Curiosity

• Splunk search experience
• Scripting experience in Python or PowerShell a huge plus
• Bachelor's degree in a related field or equivalent demonstrated experience and knowledge
• GCIA, GCIH, GMON or related certifications

Apply for this Job

* Required