Job Description
- At least 2 years of experience in a SOC environment, certified and
endorsed in previous security positions. - Solid understanding of network fundamentals (TCP/IP, DNS, DHCP, next-gen firewall).
- Strong understanding of Active Directory/Entra ID, attack and defense techniques.
- Experience with security tools such as (SIEM, SOAR, EDR/XDR) with demonstrated projects ran solely across multi-site organization, and
processes / Security standards. - Experience with Multiple Operating Systems with a System
- Administrator level skill set on Windows / Linux / macOS.
- Automation and scripting skills using python language. (REST API).
Job Responsibilities
- Monitoring security incidents, categorization, prioritization and triage.
- Monitor and identify external threat to the publicly exposed company assets.
- Monitor cloud infrastructure, identify and triage cloud security incidents to IT & R&D.
- Threat Intelligence and threat hunting execution.
- Tack tactical issues in the execution of SOC responsibilities.
- Collaborate with IT and R&T teams in term of incident remediation.
- Assist a team with security projects (proof of concept, documentation,testing and production implementation).
- Plan and execute security awareness training.
- Incident reporting and improvement plans design.
Required languages
| English | B1 - Intermediate |
The job ad is no longer active
Look at the current jobs Data Analyst →
📊
Average salary range of similar jobs in
analytics →
Loading...