SOC Analyst responsible for security operations at GBG, enhancing measures and collaborating with teams. Engage in threat detection, analysis, and response to incidents in a fast-paced environment.
Responsibilities
Maintain up-to-date knowledge of the threat landscape: Stay informed about new security solutions and emerging cyber-attacks.
Review and analyse logs: Interpret problem activity and prepare detailed analysis and management reports with improvement recommendations.
Identify, investigate, and resolve security alerts: Use SIEM tools and other security technologies to detect, analyse, and respond to security incidents.
Provide regular statistics and information for service and management reviews: Generate and present periodic reports on security metrics, incident trends, and overall security posture.
Raise awareness of security operations services: Educate peers and business stakeholders about security operations services and provide training as needed.
Conduct hypothesis-based threat hunting: Utilise up-to-date threat landscape research to proactively search for indicators of compromise (IoCs) and potential threats within the network.
Offer security advisory and situational awareness briefings: Provide stakeholders with timely and relevant security advisories, situational awareness briefings, and threat intelligence updates.
Ensure processes align company policy, and regulatory requirements: Regularly review and update security processes and procedures to ensure compliance.
Build high-trust relationships: Foster strong relationships with internal teams, external partners, and stakeholders to facilitate effective communication and collaboration on security matters.
Monitor Threat Intelligence Platforms: Ensure threat intelligence data is current and actionable. Respond to alerts and integrate threat intelligence into security operations.
Use SIEM and security tools: Continuously monitor GBG’s security posture using SIEM and other security tools. Identify and investigate anomalous activities and behaviours and take appropriate actions to mitigate risks
Requirements
Previous experience in a SOC or similar security role.
Hands-on experience with threat intelligence platforms.
Hands-on experience with SIEM and security solutions.
Familiarity with regulatory requirements and standards (e.g., ISO27001, GDPR, PCI-DSS).
Proficiency in using SIEM (Security Information and Event Management) tools.
Knowledge of network protocols and infrastructure.
Knowledge of cloud-based Infrastructure and SaaS platforms.
Experience with intrusion detection/prevention systems (IDS/IPS).
Familiarity with endpoint security solutions.
Understanding of firewalls, VPNs, and other security technologies.
Ability to analyse and interpret log data.
Strong problem-solving and analytical abilities.
Capability to conduct root cause analysis.
Excellent verbal and written communication skills.
Ability to prepare detailed reports and documentation.
Proficiency in delivering security briefings and training sessions.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.
Security Incident Response Orchestration Lead at Bank of America defining automation for security incident workflows with a focus on Splunk SOAR and Tines. Collaborating with security operations and engineering teams to implement scalable solutions.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.