Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailWe are looking for an experienced SOC Detection & Response Specialist to help build and enhance our Security Operations Center (SOC) offering. You will be responsible for developing detection rules investigation and response workflows security use cases and playbooks to improve our detection and response capabilities.
Key Responsibilities:
Develop test and finetune detection rules for SIEM and security monitoring platforms (Microsoft Sentinel Palo Alto).
Create and document security use cases to detect cyber threats based on MITRE ATT&CK techniques.
Design and implement incident investigation and response processes to ensure efficient threat management.
Build automation playbooks using SOAR tools to improve incident response efficiency.
Collaborate with SOC analysts to refine alert tuning and reduce false positives.
Perform threat modeling and intelligencedriven detection to proactively identify threats.
Work with customers and internal teams to define SOC workflows and escalation procedures.
Evaluate log sources and data ingestion strategies to enhance security visibility.
Stay up to date with the latest threats vulnerabilities and attack techniques to improve SOC detection capabilities.
Provide guidance on log source onboarding parsing and correlation for improved detection coverage.
Threat intelligence analysis is a plus.
Qualifications :
Required Skills & Experience:
3 years of handson experience in a SOC Threat Detection or Incident Response role.
Expertise in SIEM platforms (e.g. Microsoft Sentinel Splunk QRadar Elastic Security).
Experience writing custom detection rules using KQL SPL Sigma or other query languages.
Strong knowledge of cyber threat detection attack techniques (MITRE ATT&CK) and security event analysis.
Experience with SOAR platforms (e.g. Microsoft Sentinel Playbooks Palo Alto XSOAR Splunk SOAR) for automation.
Familiarity with log sources (firewalls EDR IAM cloud logs etc. and how to build detections based on them.
Knowledge of incident response frameworks (NIST SANS etc. and how to structure response processes.
Scripting skills (Python PowerShell Bash) for automating security tasks (a plus).
Certifications such as Microsoft Security PaloAlto XSIAM or equivalent certifications are a plus.
Requirement
Bachelors degree in Information Technology or a related field (or equivalent experience)
Excellent interpersonal communication and listening skills
English required
Additional Information :
Comprehensive group benefits plan: life insurance longterm disability healthcare dental vision and a health spending account to promote health and wellness (Sopra Steria covers 100 of premiums)
Paid statutory holidays sick days personal days as well as 3 weeks of vacation
Monthly transportation allowance
Hybrid work environment
Company equipment to help you work efficiently
A friendly collaborative and inclusive culture
Sopra Steria has been certified as a Great Place to Work
We offer phenomenal career progression opportunities and benefits which you can flex to meet your needs. Excellent training and development opportunities and the encouragement to develop your skills in a supportive and friendly environment.
Employeur inclusif et engag notre socit uvre chaque jour pour lutter contre toute forme de discrimination et favoriser un environnement de travail respectueux. Cest pourquoi attachs la mixit et la diversit nous encourageons toutes les candidatures et tous les profils.
https://www.soprasteria/nousconnaitre/nosengagements
Remote Work :
Yes
Employment Type :
Fulltime
Remote