Assistant Lead Engineer - SOC Operations (Cyber Ops & Technologies)
The SOC operations function is responsible for planning and overseeing monitoring and maintenance of security operations, providing direction and leadership to internal resources. The Operations Engineer provides expertise on security technologies and innovative security concepts and works toward enhancing the resilience of security operations. They coordinate ongoing reviews of existing security programs, protocols, and planned upgrades. They establish escalation processes for security incidents and develop contingency plans and disaster recovery procedures, focusing on policy implementation and control.
Role & Responsibilities
- Conduct 24 / 7 continuous monitoring of security events and alerts using various security tools, such as SIEM and endpoint protection
- Perform initial triage of security alerts to determine their validity and severity, identifying false positives or true positives
- Conduct basic investigations of security events, including malware infections and unauthorized access attempts
- Escalate complex or highly suspicious alerts for further investigation and response
- Maintain detailed records of all activities, including investigations performed, findings and remediation steps taken
- Collect data, evidence, and context necessary for further escalation
- Analyze security logs, events and perform correlation and historical searches to determine the extent and impact of a security compromise
- Handle case management, generate tickets and reports when required, and track open tickets until closure
- Investigate and respond to security alerts escalated, performing root cause analysis, and providing remediation guidance
- Escalate critical cases to incident response team and provide support where needed
- Prepare scheduled and ad-hoc reports
- Quality assurance on cases handled and closed by junior SOC analyst
- Develop / strengthen playbook and processes for case handling by the SOC team
- Assist in identifying opportunities for tuning to improve detection accuracy and reduce false positives
- Willing to work 12-hour shift patterns that include weekends and public holidays
Requirements
At least 3 to 8 years' of experience working in SOC environmentStrong knowledge and experience in SIEM tools, EDR, NDRStrong experience in SOC environment, monitoring security events and alerts on endpoint and networkMust be willing to work with 12 hours shift pattern that include weekend and public holidayStrong interpersonal and communication skills#J-18808-Ljbffr