Summary
The AM SecOps is responsible for incident triage, monitoring and response innovation, basic forensics, and coordinating in response activities.
Responsibilities
- Monitor security access and report suspicious activity to a higher level or team members.
- Conduct security assessments regularly to identify vulnerabilities and performing risk analysis.
- Investigate and perform forensics of breaches to reach the root cause.
- Handling escalations and response actions for existing incidents.
- Harvesting threat intelligence and converting it to actionable content.
- Participate in table-top exercises, ethical hacking, and event triage preparation.
- Generate reports for IT/SOC administrators, business managers, and security leaders. These reports serve as an input to evaluate the efficacy of the security policies.
- Advise and implement necessary changes required to counter the attack or improvise security standards.
- Keep the security systems up to date and contributing to security strategies.
- Document incidents to contribute to incident response.
- Developing and documenting new monitoring techniques and response capabilities.
- Researching vulnerabilities and hacking utilities to harden environment.
- Learning new technical disciplines both in teams and individually.
- Hunting for risk in the environment and relating findings to actionable activities.
- Educating employees on individualized threats and/or impact of incidents.
Requirements
- B.S. degree in Computer Science or related field, or equivalent work experience.
- Minimum of 3-4 years of progressive experience as a SOC analyst, security researcher.
- Experience of working in a cross functional setting.
- Proficient with SIEM, EDR solutions like (ELK, Cortex XDR, Microsoft Defender) and other monitoring tools.
- Must have Certification like CEH, CHFI, Blue Team or any relevant certifications