More jobs:
Security Operations Consultant at Westborough, MA
Job in
Westborough, Worcester County, Massachusetts, 01581, USA
Listed on 2026-02-28
Listing for:
Info-Ways
Full Time
position Listed on 2026-02-28
Job specializations:
-
IT/Tech
Cybersecurity, Systems Engineer
Job Description & How to Apply Below
Overview
Role:
Security Operations Consultant
Location:
Westborough, MA
Duration:
Contract to Hire
BGV will be done for the selected candidates.
Responsibilities- Incident analysis and resolution
- Adding devices in the monitoring tool
- Troubleshooting L2 incidents and closing incidents on the ITSM tool and updating the KB documentation
- Configuration changes as recommended by the L3 team
- Log analysis and management – move logs from log server to reduce memory consumption / resource utilization
- SNMP configuration on security devices
- Creating SOC tool user accounts
- Creating user roles
- Creating reports and basic dashboards
- Monitoring fix tool license issues
- Vendor coordination and follow ups (e.g. RMA, TAC, patch upgrade)
- Analyzing and reporting threats and attacks
- Documentation / risk register / run book / SOP (verification)
- Coordination with SME for RCA
- SLA and KPI reports
- Checkpoint firewall (version R77.xx) :23 HA clusters
- Cisco ASA 51xx series
- Blue Coat Secure Web Gateway, CAS, Future = SSL-V appliance
- Fire Eye ETP
- Symantec
- Tufin
- SOC & Security Analysis reporting
- Proofpoint
- Support the security controls and analysis
- Resolve incidents provided by the Symantec SaaS SOC up to an L2 experience level
- Know when you need to escalate immediately and do so
- Follow playbooks that may require immediate actions, such as removing a computer from the network that has a virus
- Tasks include performing change controls related to the security environment (e.g., patching the security HW/SW environment, rule changes, building VPN B2B IPsec tunnels)
- Examples:
Bluecoat (filter web traffic on corporate networks) changes, Check Point (firewalls) changes - Using the Symantec SOC portal for analyzing logs, user administration, security control items
- Analyzing and managing logs on the security hardware
- Using the Tufin cybersecurity network security reporting tool
- Using the Fire Eye ETP tool for email security controls
- Using the Proofpoint email security tool
Please respond with your updated word resume and the following details:
- Full Name
- Work Authorization
- Contact Number
- Skype
- Current location
- Willing to relocate
- Expected Rate/hr
- Availability
- Best time to take interview
Please contact for any further information.
All your information will be kept confidential according to EEO guidelines.
#J-18808-LjbffrTo View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×