We are looking for a SOC Specialist - Incident Response to identify and respond to cyber threats, safeguarding our company's infrastructure and data. The ideal candidate will have experience in performing Cybersecurity Incident Response and Threat Hunting activities in a complex incident management or Security Operations Center environment.
Requirements
- 3+ years of relevant experience in performing Cybersecurity Incident Response and Threat Hunting activities in a complex incident management or Security Operations Center environment.
- Experience in the creation and fine-tuning of detection rules.
- Familiarity with integrating security tools via APIs for automation, and familiarity with Security Orchestration, Automation, and Response (SOAR) concepts.
- Experience with investigations and incident response using EDR tools such as CrowdStrike Falcon and SIEM tools such as Elastic Security (KQL, ESQL, Timeline analysis).
- Experience with forensic triage (disk, memory, network) and multiple operating systems (Mac, Linux, Windows).
- Experience with contributing to SOC processes, playbooks, SIEM correlation rules, and incident reports.
- Experience in incident management and communication under pressure.
- Familiarity with programming languages such as Python, JavaScript and others.
- Knowledge of NIST Cybersecurity Framework, MITRE ATT&CK.
- Knowledge of security products and device monitoring tools including Firewalls, IDS/IPS, Phishing and e-mail security, content filtering, DDoS, WAF, and more.
- GSEC, Security+, CySA+, CEH, CHFI or similar relevant certifications.
Benefits
- Health & wellbeing resources and programs
- Paid vacation, personal, and sick days for work-life balance
- Competitive compensation and benefits packages
- Work-life balance
- Career growth and development opportunities
- Opportunities to contribute to community causes
- Work with diverse team members in an inclusive and collaborative environment