Bachelor’s degree or above, majored in information security or related field
Sufficient knowledge and skills across cyber security domains: User behavior Analysis, Malware Basics, Log Analysis and Correlation, Enterprise Endpoint Security and Email Security, Network Security (IPS/IDS), Security protocols, Operating Systems (Windows, Unix, Linux)
Solid understanding of the security threat landscape and threat models, including MITRE ATT&CK/Cyber Kill Chain
Experience working with SIEM platforms, SOAR platforms, or similar technologies (preferred; opportunity for internal learning)
Skills in log analysis and data mining; preferably skills in programming or scripting languages like Python, PowerShell, Rust, or Go
Preferred certifications: Certified SOC Analyst (CSA), CompTIA Cybersecurity Analyst (CySA+), or similar (opportunity for internal learning)
A history of solving hard problems with creative solutions
Ability to communicate technical concepts to teammates and non-technical colleagues
Understanding of DevOps methodologies and practices
Experience using JIRA, Confluence
Responsibilities
Proactively protect networks, applications, and infrastructure from cyber threats globally
Manage a team and influence people or organizations to achieve significant IT outcomes
Define strategy and lead the delivery and transformation of business outcomes through Security Operations services, products, or programs
Demonstrate breadth of applied IT skills across at least two IT job profiles, applying Integrated Risk Management, IT Operations, and IT Project Management skills
Perform security alert triage and incident management activities
Drive detection, analysis, and provide guidance on the remediation of discovered vulnerabilities
Perform base security analysis and relevant follow-up actions to contain and remediate cyber threats, recover assets from security events and alarms
Work closely with Penetration Test Team, Cyber Hunt Team, Threat Intel, and other internal organizations to enhance the company’s cyber security posture
Understand and evaluate the threat landscape risk and consult on remediation steps
Use tools to analyze and respond to incidents, and proactively enhance the cyber security posture
Effectively communicate technical information to non-technical audiences and influence compliance with policies, standards, and best practices
Confirm that incidents are adequately documented, including summary of analysis, actions taken, and steps needed to resolve