Company Overview
An AI-powered recruitment marketing platform designed to efficiently and directly publish job listings to Google for Jobs, enhancing the flow of qualified candidates and streamlining the recruitment process.
Key Responsibilities:
-
Manage internal and client escalations by collaborating with key stakeholders.
-
Ensure adherence to published SOC policies and procedures by overseeing the team’s compliance.
-
Act as a subject matter expert in Managed Security Services, clearly communicating deliverables, limitations, and feasibility.
-
Lead the configuration, tuning, and maintenance of SOC tools to enhance detection capabilities, and develop reusable visualizations and dashboards for security alert triage, threat hunting, and other related activities.
-
Create Standard Operating Procedures (SOPs) and use cases for monitoring and managing different types of security events.
-
Gather and analyze threat intelligence to ensure detection methods remain effective against evolving threats.
-
Conduct proactive threat hunting based on anomalous activity.
-
Manage events as part of the Security Incident Management Process.
-
Collaborate with internal and external partners to investigate and provide guidance on security incidents and anomalies.
-
Prepare comprehensive reports detailing findings, progress, and risk factors associated with investigations.
-
Serve as the senior technical escalation point and mentor for colleagues.
-
Develop incident response playbooks to standardize the approach to handling common incidents and optimize operational processes.
-
Analyze security log data by creating aggregated or correlated reports and visualizations.
-
Identify and implement opportunities for innovation and continuous improvement.
-
Lead customer incident response efforts, advising on threat containment and remediation.
-
Participate in the Security Operations Centre on-call rotation.
Skills and Attributes for Success:
-
Strong technical expertise in Logicalis Managed Security Services, IT applications, networking, and infrastructure.
-
Proven ability to think critically and analyze complex data sets and events, developing appropriate responses to identified threats.
-
Ability to remain composed and maintain attention to detail in high-pressure, crisis situations.
-
Experience responding to customer requests, including interactions with senior management and executives.
-
Quick to learn and adapt to new technologies and processes in a rapidly evolving environment.
-
Excellent written and verbal communication skills.
-
Proactively motivated to enhance knowledge and skills.
-
Strong interpersonal skills, with a focus on people and collaboration.
-
Goal-oriented with a clear focus on outcomes.
-
Positive, solution-focused attitude with a mindset of continual improvement.
-
Exemplifies integrity and professionalism.
Qualifications & Experience:
-
Must be eligible to obtain a U.S. Government Security Clearance.
-
Typically, 5+ years of experience in IT security, including security operations, and senior or lead roles in a SOC, MSSP, or mature internal team.
-
Experience analyzing and reviewing security logs from various sources, including SIEM tools such as Microsoft Sentinel, Splunk, Arcsight, QRadar, LogRhythm, IPS/IDS, Endpoint Security (e.g., Carbon Black), and Windows Eventlog.
-
Expertise in leveraging threat intelligence within a Security Operations environment.
-
Experience securing services migrated to cloud platforms (e.g., AWS, Azure) is preferred.
-
Industry-recognized certifications such as SANS GIAC (GCIA, GCIH, GCFA, GNFA, GCTI, GREM), or CEH.