Job Description

● Analyze security logs, trace attacks, and report threats. ● Work independently with network/system administrators, developers, product owners, and other colleagues to ensure Mitigate threats, incident handling, and implementation of our applications. ● Security sensor configuration. ● Integrate organization assets with SIEM. ● Identify current and emerging technology issues including security trends, vulnerabilities, and threats. ● Monitor and analyze logs and events daily, to determine whether any events could constitute a genuine security incident. ● Perform security monitoring, reviewing, investigating, and reporting the events generated by the SIEM. ● Follow-ups on incident investigation requests. ● Handle security incidents/alerts, investigate the root cause in collaboration with other security teams, establish corrective controls and minimize the impact. ● Research and incorporate the latest international trends in security operation management. ● Document SOC output (analyzing vulnerability assessment reports, weekly, or quarterly SOC reports, and incident response reports). ● Manage vulnerability and/or risk remediation. ● Create queries, dashboards, and visualizations to detect incidents/threats and monitor SIEM systems. ● Configure security applications like Antivirus, EDR, and DLP. ● Working hours: the ability to work in circular shifts as of 7/24.

Requirements

● More than two years of work experience in information security. ● Bachelor's or Master's degree in Computer Engineering or Information Technology. ● Information security-related certifications like Certified Ethical Hacker (CEH), SANS SEC 503, and 504 are plus. ● Information Security certifications are considered a plus. Specialist knowledge: ● Understanding information security concepts, standards, and practices. ● Mastering basic security concepts to a minimum level of Security+ and CCNA Cyber FND. ● Familiar with different attacks on different layers of standard TCP/IP model. ● Familiar with log structure. ● Fluent in TCP/IP concepts (Network+ level). ● Knowledge of networking, operation systems, programming, and scripting. Each below criteria is a plus: ● Familiarity with SIEM and network monitoring tools. ● Familiarity with incident handling. ● Understanding anatomy attacks in any phase of detection and protection. Soft skills and personality traits: ● Excellent written and verbal communication skills. ● Ability to clearly communicate and present technical topics. ● High skills in solving problems and providing optimal solutions. ● Strong organizational skills and be able to attend to and prioritize projects. ● Excellent analytical and time management skills. ● Proven ability to thrive and respond to frequent demands of multiple constituents, both internal and external, in a high-demand environment. ● Ability to perform multiple tasks (multi-tasking). ● Self-study capability and morality. ● Ability to work under pressure and stressful scenarios. ● Teamwork skills. ● Discipline and professional ethics.

To see more jobs that fit your career