Provide superior technical security expertise to ensure that the Incident response is always delivering a professional service to its customers.
Conduct detailed analytical queries and investigations; identify areas that require specific attention; identify indicators of compromise (IOC) or events of interest (EOI) that need further investigation and develop use cases and rules to be developed into the SIEM platform.
Develop and improve Incident Response content and all other technologies used in the team; continually refining the rules and logic to make the detection capabilities more efficient and effective.
Understanding and working knowledge of IPS; EDR; and Threat hunting platforms. Create and enhance internal processes and procedures. Professional communications and reporting to SOC stakeholders and customers.
Act as a mentor and team lead to all First Level Security Analysts; support and supervise them; ensure knowledge transfer within the team. Deliver qualified information about actual threats and indications; recommendations how the associated risk can be mitigated. Contribute to the overall performance and success of the Security Operations Centre.
Key responsibilities:
Build on and continuously improve SOC analytics framework. Ensure effective operation of SIEM content: filters; rules; expressions and other identification mechanisms of the threat and vulnerability management technologies used within the SOC. Mentor and guide the First Level Security Analysts.
Provides professional data analysis within the SOC processes and to SOC customers in order to drive further security measures and risk mitigation activities. Responsible for execution and maintenance of SOC related analytical processes and tasks.
Detailed technical security reporting to Management operating companies and appropriate stakeholders.
Work closely with other Information Security teams to ensure effective intrusion detection and incident response. Continually maintain and improve technical capabilities through individual development activities; accreditations and certifications to remain constantly prepared to challenge the ever-evolving cyber threat. Deep information security expertise.
Excellent knowledge of one of the SIEM products Qradar; ELK; Splunk. Good knowledge of IPS/IDS; Endpoint Analysis and Threat hunting.
Understanding of forensics tools and processes.
Knowledge of network technologies; Windows and Unix administration. Knowledge of typical security devices such as firewalls; intrusion detection systems; AV and End Point security; Web Application Firewalls; anti-spam systems; event correlation systems; etc.
Understanding of security threats; attack scenarios; analysis and intrusion detection skills Information Security and/or Information Technology industry certification (GCIH; GCFA;CISSP or equivalent) preferred.
Job Classification
Industry: IT Services & ConsultingFunctional Area / Department: IT & Information SecurityRole Category: IT SecurityRole: Cyber SecurityEmployement Type: Full time