Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailInvestigate and resolve escalated advanced security incidents
Collect forensic data analyze root causes restore systems and lead containment eradication and recovery
Conduct post-incident reviews to identify and fix gaps
Mentor L1 analysts on investigations escalation and threat mitigation
Lead SOC knowledge sharing and review escalated cases for proper triage and analysis
Collaborate with IT engineering and compliance to improve workflows and response plans
Develop training materials and maintain SOC knowledge base aligned with best practices
Tune detection tools to improve accuracy and reduce false positives
Manage complex tuning requests and refine detection logic
Conduct threat hunting on hosts domains and networks
Use threat intelligence to identify and counter emerging threats
Develop detection rules for network and host threats
Expand coverage using IOAs and IOCs
Manage SIEM EDR XDR scanners firewalls and email gateways
Stay updated on threats and mitigation
Participate in red/blue team exercises
Create detailed reports on incidents threats and SOC performance
Present briefings to stakeholders
Ensure documentation is thorough and shared
Maintain 24/7 SOC readiness
Escalate complex events guide junior analysts and improve workflows and detection
Strong knowledge of security frameworks MITRE ATT&CK SIEM EDR XDR scanners firewalls IDS/IPS
Skilled in log analysis forensics and event correlation
Analyze malicious activity across endpoints networks and cloud
Excellent problem-solving communication multitasking and adaptability under pressure
3 years SOC or cybersecurity experience
Bachelors in Cybersecurity Computer Science or related or equivalent experience
Certifications like CompTIA CASP Pentest eCTHP BTL2 GCIH preferred
Required Experience:
IC
Full-Time