Act as a first-line SOC analyst (approximately 60% of the time), working in a fast-paced and dynamic team environment where everyone, including management, contributes to L1 analysis.
Collaborate with the team to develop and implement use cases and/or engineer new solutions and/or generate reports and/or perform other tasks as agreed upon with the consultant (approximately 40% of the time).
Utilize our SOC techstack: Splunk, TheHive, and Tines as an automation platform.
Stay up-to-date with emerging threats and technologies, applying this knowledge to improve our SOC operations and incident response capabilities.
Requirements
Bachelor's degree in related field and 6 years in IT (3 years in Cybersecurity) or Bachelor's degree in unrelated field and 10 years in IT (with 5 years in Cybersecurity).
Mandatory certifications: Minimum one certification in cybersecurity and one in incident response or computer/digital forensics (GCFA, GCFE, ECIH, OffSec IR-200).
Experience with scripting and programming languages (e.g., PowerShell, Python, Ruby, Bash) to automate tasks and develop custom testing scripts.
Expertise with SIEM platform, such as Splunk, for anomaly detection and threat hunting.
Strong knowledge of Incident Response Platform, like TheHive, for case management and collaboration.
Experience with SOC automation (eg. Tines automation).
Skilled with tools like MISP or OpenCTI.
Experience with EDR platform (eg. Bitdefender Gravity) for endpoint security.
Understanding of incident response and digital forensic and especially in the field of windows forensic.