Overview
As a key member of our security team, you will be responsible for serving as a subject matter expert in our technology stack while optimizing security tools and detection workflows. This role demands advanced analytical skills to conduct in-depth analysis of escalated security incidents from Tier 1 analysts, performing advanced threat investigations to determine attack vectors, assess impact scope, and develop comprehensive remediation strategies.
Responsibilities
- General responsibilities :
- Recommend improvements for Standard Operating Procedures (SOPs)
- Propose enhancement on tools and workflow
- Respond in a timely manner to support tickets
- Document actions in tickets to effectively communicate information internally and to customers
- Adhere to policies, procedures, and security best practices
- Take responsibility for customer satisfaction and overall success of managed services
- Mentor fellow Security Engineers and Security Analysts
- Service improvement :
- Optimize SIEM rules and detection logic to reduce false positives and improve detection accuracy
- Validate Go-to-Active and Go-to-Prod gates of our new clients to ensure a smooth transition to operation
- Continuously improve incident templates in terms of content for the clients and in terms of automation
- Support rollout of new set of rules for our clients
- Qualify, analyze, and provide recommendations for new standard data source requests
- Support Product teams to build best new services to fit with Operations capabilities
- Manage escalated cases from T1 Analysts
- Analyze and respond to security events from SIEM, EDR, FWs, IDS, IPS, AV and other security data sources
- Deliver high quality Incident Handling and investigation
- Conduct threat hunting activities using advanced analytics and threat intelligence
- Provide 24 / 7 on-call support for critical security incidents outside business hours
Required Skills and Qualifications
You must have :
- A minimum of 4 years of hands-on experience in cybersecurity operations, incident response, or threat analysis
- Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or equivalent experience
- Proven track record in a SOC and international / global environment
- Advanced proficiency with SIEM platforms (Splunk, QRadar, Sentinel, etc.)
- Extensive experience with EDR / XDR solutions (CrowdStrike, SentinelOne, Microsoft Defender, etc.)
- Deep understanding of network security technologies (firewalls, IDS / IPS, network monitoring)
- Strong knowledge of Windows and Linux / Unix operating systems and forensics
- Experience with cloud security (AWS, Azure, GCP) and containerization technologies
- Familiarity with OT / ICS environments and industrial control systems security
- Proficiency in scripting languages (Python, PowerShell, Bash) for automation
- Understanding of threat intelligence platforms and MITRE ATT&CK framework
Benefits
At Kudelski Security, we offer :
- Competitive compensation package that protects you and your loved ones and allows you to pursue career growth with tuition reimbursement
- Generous time off for rest, relaxation, and hobbies
- Colleagues from across the globe who are interested in helping clients protect their companies so they can focus on fulfilling their mission
About Us
Kudelski Security is an innovative, independent Swiss provider of tailored cyber and media security solutions to enterprises and public sector institutions. Our team of security experts delivers end-to-end consulting, technology, managed services, and threat intelligence to help organizations build and run successful security programs.