Conduct in-depth investigations of threats and suspicious activities.
Act as a critical escalation level for complex security incidents.
Develop and manage detection rules.
Improve visibility while reducing false positives and enhancing detection quality.
Administer and optimize key security tools: EDR/XDR, SIEM, Email Security, AppSec, PAM, IAM.
Provide operational support for additional technologies including Proxy, NGFW, and NAC.
Produce and maintain Playbooks, incident reports (RCAs), and standardized SOC procedures.
Contribute to automation initiatives using Python, Terraform, and Ansible.
Requirements
Minimum of 5 years of experience in cybersecurity, SOC (L2/L3) operations, or a related field.
Hands-on experience implementing security platforms and managing incidents.
Strong knowledge of log administration, network protocols (TCP/IP, DNS, HTTPS, etc.), and Windows/Linux system.
Operational knowledge of NIS2, ISO 27001, or CIS Controls.
Advanced level of English (daily working language).
Relevant certifications such as CompTIA Security+, Blue Team Level 2 (BTL2), GIAC (GCIH/GCFA), CEH, CISSP, Microsoft SC-200/SC-300, or vendor-specific certifications (Palo Alto, Splunk).
Tech Stack
Ansible
Cyber Security
DNS
Linux
Python
Splunk
TCP/IP
Terraform
Benefits
Join an innovative team and experience company growth.
We believe in investing in our employees and providing them with the opportunities they need to grow and develop their careers.
Enjoy a hybrid work environment.
We also offer flexible schedule.
We offer a remuneration that values your experience.