Bachelor’s degree in Computer Science, Information Security, or a related field.
Atleast 1 year experience working on cyber security and threat intelligence.
Proven experience in a security operations role, with a strong understanding of incident response and threat intelligence.
Excellent communication and coordination skills.
Ability to work effectively under pressure and manage multiple incidents simultaneously.
Preferred Qualifications:
Required communication skills, with the ability to clearly articulate complex issues to both technical and non-technical audiences.
Required leadership abilities, particularly in high-pressure situations.
Detail-oriented with problem-solving and analytical skills.
Responsibilities
Incident Assessment and Response: Analyze security alerts and incidents to determine their impact and scope.
Respond to security incidents, ensuring appropriate containment, eradication, and recovery efforts are executed are executed efficiently.
Document and report on incident findings, providing actionable insights to improve our security posture.
Compliance and Regulatory Oversight: Collaborate with legal and compliance teams to align incident response processes with regulatory obligations.
Communication and Coordination: Serve as the primary point of contact during security incidents, providing clear, accurate, and timely communication to stakeholders.
Prepare and deliver incident reports to senior leadership, legal, compliance, and other relevant teams. Coordinate with other SOC (Security Operations Center) analysts, IT teams, and third-party vendors as necessary to ensure an effective response to incidents.
Continuous Improvement: Participate in post-incident reviews and contribute to the development of detections, playbooks and standard operating procedures (SOPs) for security incidents.
Identify gaps in security controls and make recommendations for improvements.
Conduct training and awareness sessions for SOC team members and other stakeholders on security-related topics.
Threat Intelligence and Monitoring: Monitor threat intelligence feeds and other sources to identify emerging privacy threats and vulnerabilities.
Proactively hunt for indicators of compromise (IOCs) related to threats and regulatory concerns.