Key responsibilities & Accountabilities:* Advanced Incident Response & Threat InvestigationInvestigate and remediate escalated security incidents involving advanced attack detailed forensic data collection root cause analysis and system restoration.* Mentorship & Knowledge SharingProvide guidance and mentorship to L1 analysts on investigation techniques escalation workflows and threatmitigation knowledge-sharing sessions within the SOC to improve detection capabilities.* Inter-Team Collaboration & DocumentationWork alongside IT engineering and compliance teams to enhance security workflows and response training materials and process documentation to support cross-functional security initiatives.* Advanced Security Stack Management & OptimizationConduct advanced tuning of security detection tools to enhance accuracy and reduce false complex tuning requests escalated from L1 analysts.* Threat Hunting & Proactive Security AnalysisPerform in-depth analysis of suspicious activities to uncover and mitigate hidden security intermediate-level threat hunting focusing on host artifacts domain patterns and network anomalies.* Intermediate Detection EngineeringDevelop detection rules and mechanisms to address network and host-based threats.* Security Tools Proficiency & Continuous ImprovementUtilize and manage SIEM EDR XDR vulnerability scanners firewalls and email gateways at an intermediate level.* Reporting Documentation & Stakeholder CommunicationCreate detailed security reports on incidents emerging threats and SOC operational performance* 24x7 SOC Operations & Leadership SupportMaintain operational readiness in a 24/7 SOC environment ensuring effective incident management and responseduring all as a point of escalation for complex security events providing guidance to junior analysts and ensuring smoothSOC to continuous improvement efforts refining SOC workflows and enhancing detection & AbilityTechnical SkillsStrong understanding of security frameworks attack tactics (MITRE ATT&CK) and defensive security in security monitoring tools (SIEM EDR XDR vulnerability scanners firewalls IDS/IPS).Experience with log analysis forensic investigation techniques and security event to analyze malicious activity across endpoints networks and cloud SkillsStrong problem-solving skills with the ability to investigate and resolve complex security written and verbal communication for effective documentation and to work in high-pressure environments multitask and adapt to evolving cybersecurity challengesEducational Qualifications3 years of experience in SOC operations cybersecurity analysis or incident degree in Cybersecurity Computer Science or related field OR equivalent hands-on certifications such as CompTIA CASP Pentest eCTHP BTL2 GCIH or similar are a plus.
Required Experience:
IC