Epicareer Might not Working Properly
Learn More

SOC Analyst – Security and Compliance

Salary undisclosed

Checking job availability...

Original
Simplified

Are you a person with a knowledge of Ethical hacking skill? Are you interested in working in a multilingual, dynamic and friendly environment that encourages personal and professional development? We would love to meet you!

This position exists to detect and respond to security incidents, breaches, indicators of compromise, etc., in regard to GEM data, networks, devices, cloud platforms, and business systems across the organization. The primary role of the Security Operation Center (SOC) Analyst is to monitor the organization’s IT infrastructures for security threats and safeguard of the company's digital assets, by proactive threat hunting, detection engineering, etc.

The SOC Analyst will also assist during an incident response to ensure all in scope assets which have been, or currently are in the process of being attacked and/or compromised are properly protected.

What does your typical day look like?

Conduct a preliminary analysis of suspicious files and network traffic to identify malware and determine its capabilities and potential impact.

Proactive threat hunting to determine if there are ongoing attacks, indicators of compromise, insider threats, etc. that might have evaded automated detection across the organization and flag any missing alerts and/or triggers to Security Analyst.

Monitor network traffic to detect and respond to threats immediately as they occur.

Engage in malware analysis, reverse engineering of binary/executable files, etc. using the required tools and techniques.

Provide effective detection engineering (configuration and testing of alerts, SIEM rules review, SOAR/Automated response, etc.)

Support Red Team efforts when performing internal and external security pentesting to ensure we have visibility on these attacks.

Support and participate in security simulations and Red Team exercises

What skills and experience are we looking for?

  • Undergraduate degree in information systems, or computer science.
  • Three to five years of experience working with technical security.
  • Deep-seated experience with desktop and server operating systems.
  • Extensive application support experience.
  • Understanding of web development, HTTP, HTML, and application security.
  • Certified Incident Handler (E|CIH, eCIR, etc).
  • Experience with SIEM solutions (preferably Exabeam and SQL server).
  • Something service base that relates to the company as a whole
  • It is very important to keep requirements accurate and follows a format. Making easy for candidates to navigate and encourages the best candidates to apply.

Are you a person with a knowledge of Ethical hacking skill? Are you interested in working in a multilingual, dynamic and friendly environment that encourages personal and professional development? We would love to meet you!

This position exists to detect and respond to security incidents, breaches, indicators of compromise, etc., in regard to GEM data, networks, devices, cloud platforms, and business systems across the organization. The primary role of the Security Operation Center (SOC) Analyst is to monitor the organization’s IT infrastructures for security threats and safeguard of the company's digital assets, by proactive threat hunting, detection engineering, etc.

The SOC Analyst will also assist during an incident response to ensure all in scope assets which have been, or currently are in the process of being attacked and/or compromised are properly protected.

What does your typical day look like?

Conduct a preliminary analysis of suspicious files and network traffic to identify malware and determine its capabilities and potential impact.

Proactive threat hunting to determine if there are ongoing attacks, indicators of compromise, insider threats, etc. that might have evaded automated detection across the organization and flag any missing alerts and/or triggers to Security Analyst.

Monitor network traffic to detect and respond to threats immediately as they occur.

Engage in malware analysis, reverse engineering of binary/executable files, etc. using the required tools and techniques.

Provide effective detection engineering (configuration and testing of alerts, SIEM rules review, SOAR/Automated response, etc.)

Support Red Team efforts when performing internal and external security pentesting to ensure we have visibility on these attacks.

Support and participate in security simulations and Red Team exercises

What skills and experience are we looking for?

  • Undergraduate degree in information systems, or computer science.
  • Three to five years of experience working with technical security.
  • Deep-seated experience with desktop and server operating systems.
  • Extensive application support experience.
  • Understanding of web development, HTTP, HTML, and application security.
  • Certified Incident Handler (E|CIH, eCIR, etc).
  • Experience with SIEM solutions (preferably Exabeam and SQL server).
  • Something service base that relates to the company as a whole
  • It is very important to keep requirements accurate and follows a format. Making easy for candidates to navigate and encourages the best candidates to apply.