What you’ll doAs a SecOps Expert, you’ll be responsible for securing and protecting our infrastructure, including managing and administering various security-related technologies, platforms, and tools. You'll also provide security expertise and guidance to the team on various security-related matters
, including translating product usage data into actionable advice for security.
You’ll build and own solutions to quickly identify breach attempts, contain and eradicate threats, streamline our security incident response processes, continuously test our controls, and help the business make informed decisions based on threat intelligence.
This is a fast-paced environment, where you’ll have the opportunity to manage multiple projects at once.
Responsibilities- Investigate alerts, triage, deep dive, and come up with proper action items and remediation plans.
- Coordinate investigation, containment, and other response activities with business stakeholders and groups.
- Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement.
- Recommend or develop new detection logic and tune existing sensors/security controls.
- Work with security solutions owners to assess existing security solutions ability to detect/mitigate the abovementioned TTPs.
- Creating custom SIEM queries to support the monitoring and detection of advanced TTPs against the company network.
- Translating product usage data into actionable advice for security.
- Provide business guidelines in a regular cadence with Security and technical Stakeholders in collaboration with the Account Team, including Product, DevOps, Support, etc.
Minimum Requirements- 4+ years experience working in an Incident Response/Cyber Security Operations Center (in-house or outsourced) creating, escalating, and managing security incidents and creating incident reports.
- Managing low to high-risk cybersecurity events, alerts, and incidents, event monitoring, and analysis, and responding to and escalating IT/DevOps security events and threats and vulnerabilities.
- Collaborating with stakeholders to drive incident response and remediation.
- Development of common runbooks for most frequent or critical incident types.
- 3+ years of working with security tools such as SIEM, Analytics & Intelligence, Intrusion Detection, Malware detection, Data Loss Protection, and Identity & Access Management
- Solid understanding of system and security controls on at least two OSs (Windows, Linux / Unix, and MacOS (Advantage), including host-based forensics and experience with analyzing OS artifacts.
- Problem solver, an in-depth thinker with a growth mindset.
- Excellent communication skills ( both oral and written ) and ability to work collaboratively with other teams
- Perform host-based analysis, artifact analysis, and malware analysis in support of security investigations and incident response (Advantage).
- Understanding of cryptographic algorithms utilized by public blockchain networks and other cryptography-related topics. (Advantage).
Preferred Qualifications- Bachelor's degree in Computer Science, Information Technology, or related field
- Familiarity with cloud services, Kubernetes, cloud environment architecture, and the major cloud providers (AWS, GCP, Azure)