Search by job, company or skills
NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant. Managed extended detection and response (MXDR), attack surface management (ASM), breach and attack simulation (BAS), and advisory services fortify your cybersecurity across both offense and defense. AI-driven intelligence in our Nopal360 platform, our NopalGo mobile app, and our proprietary Cyber Intelligence Quotient (CIQ) lets anyone quantify, track, and visualize their cybersecurity posture in real-time. Our service packages, which are each tailored to a client's needs and budget, and external threat analysis, which provides critical intelligence at no-cost, help to democratize cybersecurity by making enterprise-grade defenses and security operations available to organizations of all sizes. NopalCyber lowers the barrier to entry while raising the bar for security and service.
We are looking for a proven, high energy, results oriented SOC professional, where you will be a key resource for our clients analyzing business requirements to design and assist implement ideal SOC solutions for their needs.
Job responsibilities:
Monitor, analyze, and interpret security/system logs for events, operational irregularities, and potential incidents, and escalate issues as appropriate
Responsible for monitoring, detection of analysis through various input tools and systems (SIEM, IDS / IPS, Firewalls, EDR, etc.)
Conduct basic red team exercises to test the effectiveness of preventive and monitoring controls
Provides support for complex system/network exploitation and defense techniques to include deterring, identifying, and investigating system and network intrusions
Support malware analysis, host and network, log analysis, and triage in support of incident response
Maintaining and improving the security technologies deployed, including creating use cases, customizing or better configuring the tools based on past and current threats
Monitoring threat/vulnerability landscape, security advisories, and acting on them as appropriate
Continuously monitors the security alerts and escalation queue, triages security alerts
Monitoring and tuning SIEM (content, parsing, maintenance)
Monitoring Cloud infrastructure for security-related events
Delivers scheduled and ad-hoc reports
Develop and coach L1 analysts
Author Standard Operating Procedures (SOPs) and training documentation
Work the full ticket lifecycle; handle every step of the alert, from detection to remediation
Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty
Perform threat-intel research, learn new attack patterns, actively participate in security forums.
Job specifications:
Qualification:
Experience:
Desired Skills:
Personal Attributes
Industry:Other
Job Type:Permanent Job
Date Posted: 20/11/2024
Job ID: 100986961