Monitor IT Security posture and perform advanced analysis using various tools and techniques to investigate, correlate, and understand anomalies or threats
Handle IT Security incidents
Test and develop new threat detection use cases in collaboration with SOC Engineers
Collaborate with SOC Analysts, SOC Engineers, and SOC Manager to improve SOC tools, procedures, and processes
Requirements
Minimum of 5 years of experience as SOC Analyst (L2/L3), Incident Responder, or Threat Hunter
Experience in areas of SOC, Cyber Security, Incident Responder, Security Automation Developer, Penetration Testing, or Digital Forensics
Good reporting skills and analytical expertise
Good organizational and prioritization skills
Willingness to collect new skills / knowledge
Ability to work autonomously
Constructive team spirit and good communication skills
Good understanding of security concepts in various infrastructure (e.g., network, OS) and cloud providers (e.g., Azure, AWS)
Experience in handling IT Security Incidents and collaborating with multiple stakeholders
Strong knowledge in working with SIEM, SOAR, EDR solutions, cloud security modules, and threat intelligence services
Deep understanding of attack techniques and detection methods to create or tune threat detection use cases / playbooks
Experience in scripting and automation
Tech Stack
AWS
Azure
Cloud
Cyber Security
Benefits
Collaborative environment
Ongoing personal & career development opportunities