Job Details
Skills And Tools:
Job Description
- Participate in a team of Security Operations Center (SOC) engineers to investigate alerts, anomalies, errors, intrusions, malwares to identify remediation and recommend security improvements.
- Perform security monitoring and incident response of cyber security events as part of a Security Operations Center (SOC)
- Continuously monitor and analyze security alerts using multiple tools, such as IDS and SIEM.
- Triage alerts to identify potential false positives, policy violations, intrusion attempts, and compromises.
- Consolidate data from alert triage to provide context necessary to initiate Tier II work.
- Escalate triaged alerts to Tier II Analysts for deeper analysis and review.
- Analyze network and host-based security appliance logs to determine the correct remediation actions.
- Review SIEM most recent alerts to determine their relevance and urgency.
- Monitor and investigate alerts leveraging EDR solutions.
- Carry out triage to ensure that a genuine security incident is occurring.
- Configure security monitoring tools.
Job Requirements
- Solid technical knowledge of TCP/IP and networking.
- Basic knowledge of SIEM monitoring.
- Basic knowledge of network security technologies (Firewalls, IDS/IPS, WAF, Antivirus).
- Basic knowledge of threat intelligence.
- Basic knowledge of incident response.
- Basic knowledge of cyber attacks.
- Good reporting skills.
- 0-1 years of experience in cybersecurity or a related field.
- Administrative skills in operating systems such as Windows and Linux.
- Programming skills in 1 or more of the following: Python, PHP, C, C#, Java