Advanced Incident Response & Threat Investigation :
- Investigate and remediate escalated security incidents involving advanced attack techniques.
- Perform detailed forensic data collection root cause analysis and system restoration.
Mentorship & Knowledge Sharing :
- Provide guidance and mentorship to L1 analysts on investigation techniques escalation workflows and threat mitigation strategies.
- Conduct knowledge-sharing sessions within the SOC to improve detection capabilities.
Inter-Team Collaboration & Documentation :
- Work alongside IT engineering and compliance teams to enhance security workflows and response plans.
- Develop training materials and process documentation to support cross-functional security initiatives.
Advanced Security Stack Management & Optimization :
- Conduct advanced tuning of security detection tools to enhance accuracy and reduce false positives.
- Address complex tuning requests escalated from L1 analysts.
Threat Hunting & Proactive Security Analysis :
- Perform in-depth analysis of suspicious activities to uncover and mitigate hidden security threats.
- Conduct intermediate-level threat hunting focusing on host artifacts domain patterns and network anomalies.
Intermediate Detection Engineering :
- Develop detection rules and mechanisms to address network and host-based threats.
Security Tools Proficiency & Continuous Improvement :
- Utilize and manage SIEM EDR XDR vulnerability scanners firewalls and email gateways at an intermediate level.
Reporting Documentation & Stakeholder Communication :
- Create detailed security reports on incidents emerging threats and SOC operational performance
24x7 SOC Operations & Leadership Support :
- Maintain operational readiness in a 24/7 SOC environment ensuring effective incident management and response
- during all shifts. Act as a point of escalation for complex security events providing guidance to junior analysts and ensuring smooth
- SOC operations. Contribute to continuous improvement efforts refining SOC workflows and enhancing detection capabilities.
Requirements
- Min 1 years of experience in SOC operations cybersecurity analysis or incident response.
- Junior: (Exp min 1 to max 4 years)
- Senior: (Exp min 6 years lead level)
- Bachelors degree in Cybersecurity Computer Science or related field OR equivalent hands-on experience.
- Security certifications such as CompTIA CASP Pentest eCTHP BTL2 GCIH or similar are a plus.
Technical Skills & Ability:
- Strong understanding of security frameworks attack tactics (MITRE ATT&CK) and defensive security operations.
- Proficiency in security monitoring tools (SIEM EDR XDR vulnerability scanners firewalls IDS/IPS).
- Experience with log analysis forensic investigation techniques and security event correlation.
- Ability to analyze malicious activity across endpoints networks and cloud environments.
Soft Skills
- Strong problem-solving skills with the ability to investigate and resolve complex security incidents.
- Excellent written and verbal communication for effective documentation and reporting.
- Ability to work in high-pressure environments multitask and adapt to evolving cybersecurity challenges
Required Skills:
Min 1 years of experience in SOC operations cybersecurity analysis or incident response. Junior: (Exp min 1 to max 4 years) Bachelors degree in Cybersecurity Computer Science or related field OR equivalent hands-on experience. Security certifications such as CompTIA CASP Pentest eCTHP BTL2 GCIH or similar are a plus. Technical Skills & Ability: Strong understanding of security frameworks attack tactics (MITRE ATT&CK) and defensive security operations. Proficiency in security monitoring tools (SIEM EDR XDR vulnerability scanners firewalls IDS/IPS). Experience with log analysis forensic investigation techniques and security event correlation. Ability to analyze malicious activity across endpoints networks and cloud environments. Soft Skills Strong problem-solving skills with the ability to investigate and resolve complex security incidents. Excellent written and verbal communication for effective documentation and reporting. Ability to work in high-pressure environments multitask and adapt to evolving cybersecurity challenges
Advanced Incident Response & Threat Investigation : Investigate and remediate escalated security incidents involving advanced attack techniques.Perform detailed forensic data collection root cause analysis and system restoration.Mentorship & Knowledge Sharing :Provide guidance and mentorship to L1 a...
Advanced Incident Response & Threat Investigation :
- Investigate and remediate escalated security incidents involving advanced attack techniques.
- Perform detailed forensic data collection root cause analysis and system restoration.
Mentorship & Knowledge Sharing :
- Provide guidance and mentorship to L1 analysts on investigation techniques escalation workflows and threat mitigation strategies.
- Conduct knowledge-sharing sessions within the SOC to improve detection capabilities.
Inter-Team Collaboration & Documentation :
- Work alongside IT engineering and compliance teams to enhance security workflows and response plans.
- Develop training materials and process documentation to support cross-functional security initiatives.
Advanced Security Stack Management & Optimization :
- Conduct advanced tuning of security detection tools to enhance accuracy and reduce false positives.
- Address complex tuning requests escalated from L1 analysts.
Threat Hunting & Proactive Security Analysis :
- Perform in-depth analysis of suspicious activities to uncover and mitigate hidden security threats.
- Conduct intermediate-level threat hunting focusing on host artifacts domain patterns and network anomalies.
Intermediate Detection Engineering :
- Develop detection rules and mechanisms to address network and host-based threats.
Security Tools Proficiency & Continuous Improvement :
- Utilize and manage SIEM EDR XDR vulnerability scanners firewalls and email gateways at an intermediate level.
Reporting Documentation & Stakeholder Communication :
- Create detailed security reports on incidents emerging threats and SOC operational performance
24x7 SOC Operations & Leadership Support :
- Maintain operational readiness in a 24/7 SOC environment ensuring effective incident management and response
- during all shifts. Act as a point of escalation for complex security events providing guidance to junior analysts and ensuring smooth
- SOC operations. Contribute to continuous improvement efforts refining SOC workflows and enhancing detection capabilities.
Requirements
- Min 1 years of experience in SOC operations cybersecurity analysis or incident response.
- Junior: (Exp min 1 to max 4 years)
- Senior: (Exp min 6 years lead level)
- Bachelors degree in Cybersecurity Computer Science or related field OR equivalent hands-on experience.
- Security certifications such as CompTIA CASP Pentest eCTHP BTL2 GCIH or similar are a plus.
Technical Skills & Ability:
- Strong understanding of security frameworks attack tactics (MITRE ATT&CK) and defensive security operations.
- Proficiency in security monitoring tools (SIEM EDR XDR vulnerability scanners firewalls IDS/IPS).
- Experience with log analysis forensic investigation techniques and security event correlation.
- Ability to analyze malicious activity across endpoints networks and cloud environments.
Soft Skills
- Strong problem-solving skills with the ability to investigate and resolve complex security incidents.
- Excellent written and verbal communication for effective documentation and reporting.
- Ability to work in high-pressure environments multitask and adapt to evolving cybersecurity challenges
Required Skills:
Min 1 years of experience in SOC operations cybersecurity analysis or incident response. Junior: (Exp min 1 to max 4 years) Bachelors degree in Cybersecurity Computer Science or related field OR equivalent hands-on experience. Security certifications such as CompTIA CASP Pentest eCTHP BTL2 GCIH or similar are a plus. Technical Skills & Ability: Strong understanding of security frameworks attack tactics (MITRE ATT&CK) and defensive security operations. Proficiency in security monitoring tools (SIEM EDR XDR vulnerability scanners firewalls IDS/IPS). Experience with log analysis forensic investigation techniques and security event correlation. Ability to analyze malicious activity across endpoints networks and cloud environments. Soft Skills Strong problem-solving skills with the ability to investigate and resolve complex security incidents. Excellent written and verbal communication for effective documentation and reporting. Ability to work in high-pressure environments multitask and adapt to evolving cybersecurity challenges
View more
View less