- Design deploy and manage the lifecycle of SOC platforms (SIEM SOAR EDR).
- Integrate data from various sources and build log ingestion pipelines.
- Automate alert prioritization and incident response tasks.
- Develop and refine correlation rules and behavioral detections aligned with MITREs ATT&CK framework.
- Assess detection gaps and implement improvements using Red/Purple Team techniques.
- Provide technical support to SOC analysts during incident management.
- Develop investigation scripts and participate in post-incident reviews.
- Participate in the off-hours on-call rotation for incident coverage.
- Monitor the health performance and data integrity of SOC tools and pipelines.
- Ensure high availability scalability and secure configuration of security technologies. Collaborate with IT cloud and application teams to ensure comprehensive log collection.
- Maintain documentation of detection logic processes and system configurations.
- Contribute to audits compliance reviews and evidence gathering activities.
Qualifications :
- Bachelors degree in computer science cybersecurity or equivalent experience.
- Minimum 3 years of experience in security engineering or threat detection.
- Hands-on experience with SIEM platforms (e.g. Microsoft Sentinel Splunk QRadar) SOAR and endpoint security tools.
- Excellent scripting skills (Python PowerShell Bash) for automation and tool integration.
- Good knowledge of MITRE ATT&CK frameworks NIST CSF and CIS controls.
- Strong analytical and problem-solving skills.
- Demonstrated ownership and accountability for security technologies or systems.
- Experience with cloud-native security tools and logs (Azure AWS GCP).
- Experience integrating external data feeds and building custom parsers.
- Recognized certifications: GCIA GCIH GCED CISSP CySA AZ-500 Security etc. (Asset)
Remote Work :
No
Employment Type :
Full-time
Design deploy and manage the lifecycle of SOC platforms (SIEM SOAR EDR).Integrate data from various sources and build log ingestion pipelines.Automate alert prioritization and incident response tasks.Develop and refine correlation rules and behavioral detections aligned with MITREs ATT&CK framework....
- Design deploy and manage the lifecycle of SOC platforms (SIEM SOAR EDR).
- Integrate data from various sources and build log ingestion pipelines.
- Automate alert prioritization and incident response tasks.
- Develop and refine correlation rules and behavioral detections aligned with MITREs ATT&CK framework.
- Assess detection gaps and implement improvements using Red/Purple Team techniques.
- Provide technical support to SOC analysts during incident management.
- Develop investigation scripts and participate in post-incident reviews.
- Participate in the off-hours on-call rotation for incident coverage.
- Monitor the health performance and data integrity of SOC tools and pipelines.
- Ensure high availability scalability and secure configuration of security technologies. Collaborate with IT cloud and application teams to ensure comprehensive log collection.
- Maintain documentation of detection logic processes and system configurations.
- Contribute to audits compliance reviews and evidence gathering activities.
Qualifications :
- Bachelors degree in computer science cybersecurity or equivalent experience.
- Minimum 3 years of experience in security engineering or threat detection.
- Hands-on experience with SIEM platforms (e.g. Microsoft Sentinel Splunk QRadar) SOAR and endpoint security tools.
- Excellent scripting skills (Python PowerShell Bash) for automation and tool integration.
- Good knowledge of MITRE ATT&CK frameworks NIST CSF and CIS controls.
- Strong analytical and problem-solving skills.
- Demonstrated ownership and accountability for security technologies or systems.
- Experience with cloud-native security tools and logs (Azure AWS GCP).
- Experience integrating external data feeds and building custom parsers.
- Recognized certifications: GCIA GCIH GCED CISSP CySA AZ-500 Security etc. (Asset)
Remote Work :
No
Employment Type :
Full-time
View more
View less