Protecting Digital Assets
A unique opportunity to safeguard the integrity of operations and maintain client confidence.
The Role
* Monitor, analyze, and respond to security alerts across SIEM, NDR, firewall, and endpoint platforms.
* Investigate incidents end-to-end, including containment, recovery, and lessons learned.
* Design and refine detection rules, use cases, and playbooks, keeping pace with evolving threats.
* Tune detection mechanisms to enhance accuracy and reduce false positives.
* Collaborate with technical and business stakeholders to continually strengthen security posture.
* Maintain meticulous documentation and contribute to SOC reporting and knowledge base.
Required Skills and Qualifications
* Proven experience (typically 2–4 years) in SOC, incident response, or security operations roles, with demonstrable detection engineering and scripting capability.
* Expertise with SIEM and XSOAR platforms (e.g., Sentinel, Splunk, Cortex XSOAR).
* Strong grasp of network protocols, operating systems, attack methodologies, and threat landscapes.
* Experience scripting or automating workflows with Python, PowerShell, or KQL.
* Excellent analytical and communication skills, with the ability to bridge technical detail and business impact.
* Professional presence and a mindset aligned with the exacting standards of a high-trust environment.
Benefits
This is an excellent opportunity for professionals seeking a challenging role in cybersecurity. The successful candidate will have the chance to develop their skills, work collaboratively, and contribute to maintaining a secure and trustworthy environment.