Job Summary The SOC Analyst is responsible for administering and supporting clients' operating system environments according to best practices, ensuring high levels of system availability and performance, with a focus on supporting security threat incidents. Responsibilities Provide L1/L2 troubleshooting for operating system issues, hardware performance, security vulnerabilities, and other basic systems management tasks. Understand services of Microsoft Windows Server OS, such as DHCP, DNS, AD, and CA. Proactively ensure the highest level of systems and infrastructure availability. Collaborate with client application teams to resolve operating system, availability, and performance issues. Monitor security, backup, and redundancy systems according to predefined standards. Work closely with and support the IT Service Desk, Engineering team, and vendors to expedite issue resolution. Regularly review event logs based on organizational/client requirements. Administer assigned tickets properly, including documentation, updates, and management of ticket performance. Identify opportunities for alert reduction and automation. Contribute to the enhancement of Standard Operating Procedure documentation. Identify alert patterns and suggest solutions. Manage, prioritize, and document security threat incidents effectively. Coordinate technical responses across IT, OT, and cloud teams for security incidents exceeding high and critical thresholds. Skills and Experience Proficiency in English and Spanish (oral and written, 85% or higher), B2+ or above. At least 1 year of relevant experience preferred. Basic knowledge of the ITIL framework. Understanding of infrastructure operations management, including backup, antivirus, and patching. Familiarity with Active Directory services. Knowledge of cloud computing concepts and basic operations. Basic Windows Server administration (versions 2003-2019), networking, and Linux. Knowledge of virtualization technologies such as VMware. Familiarity with Microsoft Office 365 and email security applications. Understanding of disaster recovery techniques. Knowledge of security incident management. Certifications like CompTIA Security+ or CCNA CyberOps Associate are preferred. Familiarity with security appliances and solutions such as IPS, IDS, Firewall, Alertlogic, FireMon, or EDR solutions. Knowledge of IT security auditing. Ability to process logs from various sources to correlate security incidents. Familiarity with security standards like NIST 800-53, CIS Controls, ISO-27000 is a plus. GCIH or EC-Council Certified Incident Handler certifications are desirable. Excellent communication skills. Flexible scheduling. Intermediate to advanced knowledge of security incident response management. About Auxis Specializes in Security Incident Response (SIR). Preferred certifications include EC-Council Certified Incident Handler (E|CIH) or similar. #J-18808-Ljbffr