Key Responsibilities
- Monitor security alerts and events using SIEM tools and other security platforms.
- Investigate, analyze, and respond to security incidents and alerts.
- Perform incident triage, containment, eradication, and recovery activities.
- Conduct log analysis to identify suspicious activities and security breaches.
- Document incidents, investigation findings, and remediation steps.
- Collaborate with IT and security teams to resolve vulnerabilities and security gaps.
- Support threat detection, threat hunting, and vulnerability management activities.
- Maintain and improve incident response procedures and playbooks.
- Participate in post-incident reviews and provide recommendations to prevent recurrence.
- Assist in implementing security monitoring tools and controls.
Required Skills
- Strong understanding of cybersecurity principles and incident response processes.
- Experience with SIEM platforms (Splunk, QRadar, Sentinel, etc.).
- Knowledge of network security, firewalls, IDS/IPS, and endpoint security.
- Familiarity with Windows, Linux, and network logs analysis.
- Understanding of threat intelligence, malware analysis, and attack vectors.
- Experience with security frameworks such as NIST, ISO 27001, or CIS.
- Strong analytical and problem-solving skills.
- Good documentation and communication skills.
Qualifications
- Bachelor's degree in Cybersecurity, Information Security, Computer Science, or related field.
- 2 5 years of experience in security operations, SOC, or incident response.
- Relevant certifications are a plus: CompTIA Security+, CEH (Certified Ethical Hacker), GIAC / GCIH, CISSP (preferred for senior roles)
Preferred Skills
- Experience with EDR/XDR tools (CrowdStrike, Carbon Black, Defender).
- Knowledge of cloud security (AWS, Azure, Google Cloud Platform).
- Familiarity with automation and scripting (Python, PowerShell, Bash).
- Experience working in a SOC environment.
For applications and inquiries, contact: hirings@openkyber.com