We are looking for a highly skilled SOC Engineer to join our dynamic security this role you will be responsible for monitoring detecting analysing and responding to security threats across the enterprise environment. Youll work hands-on with leading SIEM platforms and collaborate within an Agile team to strengthen our security posture and safeguard critical systems.
Key Responsibilities
- Continuously monitor and analyse security events across multiple SIEM platforms (e.g. Microsoft Sentinel Microsoft Defender Splunk QRadar).
- Detect investigate and respond to security incidents ensuring timely remediation and escalation when required.
- Conduct malware analysis threat hunting and proactive security assessments.
- Support incident response activities including triage evidence collection containment and post-incident reviews.
- Develop and fine-tune detection rules dashboards and alerting use cases.
- Collaborate closely with cross-functional teams within an Agile environment to drive improvements in security tooling and processes.
- Generate high-quality reporting and communicate findings to both technical and non-technical stakeholders.
- Stay up to date with emerging threats vulnerabilities and cybersecurity trends.
Requirements
- 3 years experience in a Security Operations Centre or Cybersecurity operations environment.
- Strong experience with major SIEM platforms (Sentinel Defender Splunk QRadar).
- Solid understanding of network security principles malware behaviour and security monitoring techniques.
- Hands-on experience in incident response log analysis and threat detection.
- Strong analytical problem-solving and troubleshooting capabilities.
- Excellent verbal and written communication skills with proven Agile teamworking experience.
Preferred Certifications
- CEH (Certified Ethical Hacker)
- CompTIA Security
- Or other relevant cybersecurity certifications
Required Skills:
3 years experience in a Security Operations Centre or Cybersecurity operations environment. Strong experience with major SIEM platforms (Sentinel Defender Splunk QRadar). Solid understanding of network security principles malware behaviour and security monitoring techniques. Hands-on experience in incident response log analysis and threat detection. Strong analytical problem-solving and troubleshooting capabilities. Excellent verbal and written communication skills with proven Agile teamworking experience. Preferred Certifications CEH (Certified Ethical Hacker) CompTIA Security Or other relevant cybersecurity certifications
We are looking for a highly skilled SOC Engineer to join our dynamic security this role you will be responsible for monitoring detecting analysing and responding to security threats across the enterprise environment. Youll work hands-on with leading SIEM platforms and collaborate within an Agile te...
We are looking for a highly skilled SOC Engineer to join our dynamic security this role you will be responsible for monitoring detecting analysing and responding to security threats across the enterprise environment. Youll work hands-on with leading SIEM platforms and collaborate within an Agile team to strengthen our security posture and safeguard critical systems.
Key Responsibilities
- Continuously monitor and analyse security events across multiple SIEM platforms (e.g. Microsoft Sentinel Microsoft Defender Splunk QRadar).
- Detect investigate and respond to security incidents ensuring timely remediation and escalation when required.
- Conduct malware analysis threat hunting and proactive security assessments.
- Support incident response activities including triage evidence collection containment and post-incident reviews.
- Develop and fine-tune detection rules dashboards and alerting use cases.
- Collaborate closely with cross-functional teams within an Agile environment to drive improvements in security tooling and processes.
- Generate high-quality reporting and communicate findings to both technical and non-technical stakeholders.
- Stay up to date with emerging threats vulnerabilities and cybersecurity trends.
Requirements
- 3 years experience in a Security Operations Centre or Cybersecurity operations environment.
- Strong experience with major SIEM platforms (Sentinel Defender Splunk QRadar).
- Solid understanding of network security principles malware behaviour and security monitoring techniques.
- Hands-on experience in incident response log analysis and threat detection.
- Strong analytical problem-solving and troubleshooting capabilities.
- Excellent verbal and written communication skills with proven Agile teamworking experience.
Preferred Certifications
- CEH (Certified Ethical Hacker)
- CompTIA Security
- Or other relevant cybersecurity certifications
Required Skills:
3 years experience in a Security Operations Centre or Cybersecurity operations environment. Strong experience with major SIEM platforms (Sentinel Defender Splunk QRadar). Solid understanding of network security principles malware behaviour and security monitoring techniques. Hands-on experience in incident response log analysis and threat detection. Strong analytical problem-solving and troubleshooting capabilities. Excellent verbal and written communication skills with proven Agile teamworking experience. Preferred Certifications CEH (Certified Ethical Hacker) CompTIA Security Or other relevant cybersecurity certifications
View more
View less