Join a close-knit and skilled SOC team of 6 cybersecurity professionals.
To succeed in this position, you must have:
- 3–4+ years of hands-on experience working in a SOC or Blue Team environment
- Solid experience with at least two different SIEM platforms, such as Splunk, Microsoft Sentinel, Google Chronicle/SecOps, etc.
Responsabilities :
- Hunt for threats and improve detection strategies
- Assist the SOC Lead during major incidents and handle minor ones independently
- Build and optimize Splunk alerts, dashboards, and reports based on operational needs
- Identify tuning opportunities and collaborate with Engineering to enhance SIEM capabilities
- Maintain clear, up-to-date documentation for tools and processes
- Lead the creation of monthly SOC reports and provide insights to key stakeholders
Profile:
- Bachelor’s or Master’s degree in Computer Science, Cybersecurity, Software Engineering, or a related technical field
- Deep understanding of SOC operations, incident response, and threat detection
- At least 3 years of experience in cybersecurity, ideally within Security Operations or Incident Response
- Solid experience with at least two different SIEM platforms, such as Splunk, Microsoft Sentinel, Google Chronicle/SecOps, etc.
- Familiarity with tools such as EDR, vulnerability scanners, TIPs, NDR/IPS
- Comfortable with scripting/programming (e.g., Python)
- Curious, pragmatic, and passionate about Cybersecurity and staying current with new threats
- Fluent English, both written and spoken
Prefered Skills:
One or more of the following certifications:
- SANS/GIAC GCIH “Certified Incident Handler”
- CompTIA CySA+ “Cybersecurity Analyst+”
- Security Blue Team BTL2 “Blue Team Level 2”
- Splunk Power User
- Previous experience in Financial Services or Managed Security Services
- Background in digital forensics, malware analysis, threat intelligence, security engineering, or cloud/network security