Our Security Operations Centre is a critical part of our Cybersecurity division's success.
As a Cybersecurity Analyst (SOC), you will deploy your cybersecurity expertise in a vital delivery role across our managed detection and response services.
In this role, you will use infrastructure and tools that power our Security Operations Center (SOC) to deliver desired security outcomes for our managed services clients. The ideal candidate will have familiarity with security tools such as SIEM, SOAR, EDR, and other advanced technology. You will have a proven ability to respond effectively to security incidents. This hybrid role involves both remote work and some in-office presence for collaboration, teamwork and development.
Delivery
- Monitor Security Events: Continuously monitor and analyse security alerts from EDR, SIEM and other security tools to detect suspicious activities or potential threats.
- Incident Response: Lead investigations and respond to security incidents, executing containment, mitigation, and remediation steps as necessary.
- Threat Hunting: Proactively search for indicators of compromise (IoCs) and advanced threats within the environment, utilising both automated tools and manual analysis.
- Threat Detection: Use expertise to tune detection rules, automate workflows, and improve incident detection accuracy.
- Log Analysis: Perform in-depth log analysis from firewalls, endpoint protection platforms, and SIEM solutions to investigate complex incidents.
- Threat Intelligence: Stay informed of emerging threats and collaborate with the threat intelligence team to enhance detection capabilities.
- Incident Reporting and Documentation: Ensure detailed documentation of incidents, responses, and resolutions to maintain a clear incident management process.
- Shift Work: Participate in a 24/7 shift rotation to ensure continuous security monitoring, including evening, night, and weekend shifts.
- Continuous Improvement: Work closely with other IT teams, security engineers, and senior SOC members to refine detection processes and improve overall security posture.
- Collaboration: Collaborate with SOC analysts, security engineers, and IT teams to ensure seamless operation of security tools and alignment with broader cybersecurity practices.
- Security Enhancements: Identify areas for improvement in security monitoring and response capabilities, proposing and assist with implementing new solutions where appropriate.
- Collaborating with Global Teams: Work closely with other cyber security teams to ensure seamless integration of SOC operations with our broader cybersecurity initiatives and business units especially Incident Response.
- Contributing to Internal Technical Development Initiatives: When the schedule allows, you will have opportunities to participate in and contribute to internal technical development initiatives, enhancing our tools, processes, and overall incident response capabilities.
Candidates with the following qualifications and experience are likely to succeed in our Managed Services practice at S-RM.
That said, if you don't think you meet all of the criteria below but still are interested in the job, please apply. Nobody checks every boxwe're looking for candidates that are particularly strong in a few areas and have some interest and capabilities in others.
We nurture a culture of equality, diversity and inclusion and we are dedicated to developing a workforce that displays a variety of talents, experiences and perspectives.
We're looking for:
- Qualifications: A Bachelors degree in a relevant subject, for example cybersecurity, computer science. Relevant industry certifications are advantageous, including any of the following: CISSP, CISM, GCFA, GSOC, GREM, GCWN, GCED, CCNA, OSCP, Network+ and Security+ or evidence of working towards attaining these.
- Experience: 2+ years of experience in a SOC or cybersecurity operations role.
- Technical Expertise: Solid understanding of security fundamentals, including threat detection, incident response, malware analysis, and network security.
- Tools: Expertise in EDR is required. Familiarity with other security tools such as SIEM, firewalls, and IDS/IPS is desirable.
- Incident Response: Good experience in responding to and remediating security incidents, including credential theft, ransomware, phishing, and malware attacks.
- Approach: An investigative mindset. You should be comfortable solving problems with limited information and guidance.
- Threat intelligence: Some demonstrable knowledge of cyber threat actors, and their tactics, techniques, and procedures.
- Threat Detection: Understanding of security monitoring, threat detection techniques, and the ability to exploit detection systems for optimal performance.
- Communication: Clear and concise verbal communication skills, with the ability to work effectively across teams; preferably you should be able to communicate technical findings to a non-technical audience. Able to write and format incident reports and summaries.
To apply for this role, please submit an up-to-date CV through this link: Job Application for Cybersecurity (SOC) Analyst at S-RM