Responsibilities
- Oversee SOC operations by monitoring security alerts and events, aiding in real-time threat detection and response, and participating in incident triage, investigation, and resolution to minimize downtime and maintain data integrity.
- Manage cybersecurity configurations by designing, implementing, and maintaining secure setups for hardware, software, and cloud environments, ensuring adherence to standards such as ISO 27001, NIST, or local cybersecurity regulations.
- Address and resolve complex security issues, including misconfigurations, unauthorized access attempts, and system anomalies, using debugging tools and methodologies to identify root causes and prevent future occurrences.
- Collaborate with SOC analysts and other departments to bolster overall security, providing guidance and training to junior staff on cybersecurity engineering practices.
- Assess and suggest new tools, processes, and technologies to enhance vulnerability scanning efficiency and SOC effectiveness, and participate in tabletop exercises and simulations to refine response protocols.
Compensation
Competitive
Work Arrangement
On-site
Team
Collaborative
Qualifications
- Bachelor's degree in Computer Science, Cybersecurity, or a related field.
- Proven experience in a SOC environment, with a strong background in cybersecurity.
- Certifications such as CISSP, CEH, or CompTIA Security+ are preferred.
- Proficiency in using SIEM tools, intrusion detection systems, and other security technologies.
- Strong analytical and problem-solving skills, with the ability to work under pressure.
- Excellent communication and teamwork skills, with the ability to convey complex information clearly.
- Experience with cloud security and virtualization technologies.
- Knowledge of scripting and programming languages, such as Python or PowerShell.
- Familiarity with incident response frameworks and best practices.
- Ability to work flexible hours, including on-call rotations and weekends as needed.
Preferred Qualifications
- Experience with threat intelligence platforms and data analysis tools.
- Knowledge of network protocols and security architectures.
- Familiarity with compliance frameworks and regulatory requirements.
- Experience with vulnerability management and risk assessment.
- Ability to develop and maintain documentation and procedures.
- Strong organizational skills and attention to detail.
- Experience with security information and event management (SIEM) systems.
- Knowledge of encryption technologies and secure communication protocols.
- Experience with security orchestration, automation, and response (SOAR) tools.
- Ability to stay current with emerging threats and security trends.
Not specified