As a SecOps Analyst at our company, you will be at the forefront of our organizations defense against cyber threats. Your primary role will be to detect, monitor, analyze, and respond to security events, leveraging advanced tools and techniques to detect and mitigate risks. This role is instrumental in ensuring the security and resilience of our infrastructure environment by focusing on threat detection, intelligence, and response capabilities.
Responsibilities:
Threat Monitoring: Continuously monitor security systems, networks, and endpoints using SIEM, and other InfoSec tools to detect anomalies and threats
Develop and implement new detection and correlation rules to identify and respond to security threats effectively
Alert Investigation: Investigate and triage security alerts to validate threats and assess their impact and fine-tune existing alerts to minimize false positives and improve accuracy.
Incident Response: Lead the initial response to security incidents, including containment, alerting, and escalation
Use Case Development: Design, implement, and optimize detection use cases for new and emerging threats
Log Analysis: Collect, analyze, and interpret logs from diverse sources such as InfoSec tools, internal systems, endpoints, and cloud environments
Threat Intelligence Integration: Monitor external threat intelligence sources (e.g., IOC feeds, OSINT) and apply findings to enhance detection capabilities
Tool Management: Maintain and optimize SOC tools, including SIEM, DLP, and UEBA platforms
Reporting & Dashboards: Create detailed reports on SOC activities and incidents, and create InfoSec dashboards & metrics.
Responsibilities:
Threat Monitoring: Continuously monitor security systems, networks, and endpoints using SIEM, and other InfoSec tools to detect anomalies and threats
Develop and implement new detection and correlation rules to identify and respond to security threats effectively
Alert Investigation: Investigate and triage security alerts to validate threats and assess their impact and fine-tune existing alerts to minimize false positives and improve accuracy.
Incident Response: Lead the initial response to security incidents, including containment, alerting, and escalation
Use Case Development: Design, implement, and optimize detection use cases for new and emerging threats
Log Analysis: Collect, analyze, and interpret logs from diverse sources such as InfoSec tools, internal systems, endpoints, and cloud environments
Threat Intelligence Integration: Monitor external threat intelligence sources (e.g., IOC feeds, OSINT) and apply findings to enhance detection capabilities
Tool Management: Maintain and optimize SOC tools, including SIEM, DLP, and UEBA platforms
Reporting & Dashboards: Create detailed reports on SOC activities and incidents, and create InfoSec dashboards & metrics.
Requirements:
1-2 years of experience in a SOC, IT, threat analysis, IR, or related role
Familiarity with SIEM/SOC tools
Strong understanding of log collection and analysis data
Familiarity with threat intelligence platforms, IOC feeds, and OSINT techniques
Strong analytical and critical-thinking skills for effective incident analysis
Excellent written and verbal communication skills for documentation and reporting in English
Familiarity with InfoSec/IT/Cloud tools – an advantage
Certification in the cyber security field – an advantage.
1-2 years of experience in a SOC, IT, threat analysis, IR, or related role
Familiarity with SIEM/SOC tools
Strong understanding of log collection and analysis data
Familiarity with threat intelligence platforms, IOC feeds, and OSINT techniques
Strong analytical and critical-thinking skills for effective incident analysis
Excellent written and verbal communication skills for documentation and reporting in English
Familiarity with InfoSec/IT/Cloud tools – an advantage
Certification in the cyber security field – an advantage.
This position is open to all candidates.