Epicareer Might not Working Properly
Learn More

Security Operations Specialist L2

Salary undisclosed

Apply on


Original
Simplified

Qualifications:

  • Bachelor's degree of Computer Science
  • Minimum 3 years experience in Cyber Security or at least 1-year of working as a L2 SOC
  • Responsible for working in a 24x7
  • Have min certification Splunk Power User, ECSA and ECIH or equivalent
  • Have depth knowledge of Security and Network
  • Have depth knowledge and concept cyber-attacks and techniques, threat vector, risk, and incident management
  • Have good knowledge of various operating system like Windows, Linux, Unix
  • Have good knowledge about various SIEM Splunk and Security Perimeter Device and Tools
  • Have good Documentation and Reporting Incident
  • Have experience Threat Hunting
  • Have experience Regular Expression (Regex)
  • Have experience create Splunk Dashboard, Use Case and Policy related with alert/issue/vulnerability and other security issue
  • Have experience create knowledge base/Playbook/Guideline for investigation process and every SOC process activity
  • Can performed evaluation false positive alert/issue/vulnerability
  • Have good knowledge for develop and improve processes for monitoring and incident
  • Have good Quality Incident Assessment
  • Have experience for run vulnerability scanning and analysis the result
  • Have experience and good for tracking and follow-up activity and incident base on SLA
  • Participate in professional services (internal and external penetration testing, wireless assessments, web and mobile application assessments, firewall and server security audits, social engineering exercises, security awareness programs etc.)
  • Have experience with threat intelligent platform for Perform threat intelligence analysis and investigations. Search on the dark web and use other platforms such as RF to identify intelligence indicators or threats for a specific client

Key Responsibilities:

  • Conduct detailed analysis and investigation of escalated security incidents to determine their nature and impact
  • Develop and implement incident response procedures and coordinate responses to significant security events
  • Perform forensic analysis on compromised systems to identify indicators of compromise and assess the extent of damage
  • Collaborate with other IT and security teams to address and remediate security incidents
  • Generate detailed reports and documentation on incidents, including root cause analysis and recommendations for future prevention
  • Provide guidance and training to SOC Level 1 Analysts
  • Participate in the development and refinement of SOC processes, procedures, and playbooks
  • Stay informed about emerging threats and vulnerabilities to enhance the SOC's defensive capabilities.
Similar Jobs

7d ago

Full Time, onsite, onsite

Salary undisclosed

4d ago

Full Time, onsite, onsite

Salary undisclosed