Mid-level (3 to 4 years), Senior (5 to 8 years)Experience Level
Full TimeJob Type
UnknownVisa
AutomotiveIndustries
Requirements
Bachelor’s degree in Security Management, Compliance, Computer Science, or comparable course of studies
2+ years of experience in IT Security, with a focus on Incident Response and SOC
Any of the following: CompTIA Security+, SANS Certification, OffSec Certification
Foreign languages: Fluent in English, written and verbal
Deep understanding of security systems, firewalls, authentication systems, log management, content filtering, network security, and networking technologies
Has worked with and managed at least one of the following technologies (description cuts off here)
Responsibilities
Developing and maintaining detection rules to identify malicious or suspicious activity within the environment
Implementing and managing systems for real-time threat detection and alerting
Responding to, remediating, and coordinating incident response actions with other stakeholders, both internal and external
Proactively searching for threats and vulnerabilities within the network
Developing and maintaining log collection systems such as a SIEM and/or Data Lake for long-term data retention and normalization
Developing and maintaining automation platforms within the security operations tool offering to optimize automated responses where possible
Working with other IT and IT Security teams to ensure comprehensive threat coverage and understanding of impact and criticality
Creating scripts and necessary reports to prevent disruption or unavailability of information assets and assess the impact
Analysing security attacks and advising on ways to solve them by configuring the existing security systems
Defining and implementing information assets that have software as the main component in order to improve the security posture
Developing and maintaining technical runbooks and process documentation
Conducting in-depth analysis of suspicious activities and attempted attacks, during and post incident through analysis of malware, packets, alerts, and logs for signs of malicious activity
Staying current with security operations, data analysis, and incident response technology, methodology, and legal requirements
Performing computer forensic & incident investigations when required
Ensuring that all investigations are performed in-line with regulatory requirements and internal corporate policies, standards, and procedures
Providing metrics for management and periodic intelligence reports and lessons learned on various threat actors and IOCs
Building upon existing capabilities through continuous improvement of relevant intelligence sources and methods, recommending new tools and procedures to detect threats and protect intellectual property and assets
Assisting in support of formal investigations and/or inquiries to resolve insider threat related matters, acceptable use policy violations
Identifying areas for improvement in internal processes along with possible solutions
Working with the IT Security Operations Lead to define and document standard operating procedures for security incident handling, malware analysis, vulnerability management, etc
Maintaining the confidentiality related to the professional secret and the security of the documents manipulated and administered