Professionals at Ackcent Cybersecurity share a common goal : to enhance the security of our clients, protect their assets from cyber threats, and deliver high-quality services through effective communication and customer care. In this role, you will be part of our SOC Team, responsible for security threat monitoring and incident handling, helping to secure and defend our clients' assets.
We seek professionals with experience in cybersecurity and a comprehensive understanding of Networks, Security Architecture, and Security Monitoring Tools.
As a key member of the Ackcent team, you will lead security threat and incident handling, improve and maintain tools and procedures, and conduct forensics and malware analysis for mitigation and threat containment. As a senior team member, you will also train and support junior colleagues and collaborate with other departments on security initiatives.
Key Responsibilities
- Analyze and verify security threat monitoring alerts to identify, classify, and prioritize incidents.
- Create, improve, and maintain security monitoring alerts based on data correlation from various sources.
- Operate and maintain IDS / IPS systems, collaborating with security and network architects to enhance security defenses.
- Lead responses to security incidents and investigations, coordinating with customers and IT providers while meeting SLA requirements.
- Perform forensics and malware analysis to identify indicators of compromise, evaluating incident scope and impact.
- Report findings to the SOC Manager and the involved CISO / CIO.
- Train and advise junior team members.
- Stay proactive in monitoring the cyber threat landscape through research on the latest threats and vulnerabilities.
- Ensure contractual obligations and SLAs are met or exceeded.
- Manage priorities, deadlines, and deliverables effectively.
- Develop and improve SOC tools and operational procedures.
Required Skills & Experience
- Degree in Computer or Telecommunications Engineering or a related field.
- Over 3 years of relevant experience in information security.
- Experience working in a Security Operations Center (SOC).
- Strong understanding of network fundamentals and Internet protocols.
- Knowledge of system administration and security architecture.
- Experience with security monitoring tools (firewalls, IDS / IPS, HIDS, WAF, SIEM).
- Proven experience with at least one IDS technology.
- Scripting skills in Bash, Python, or PowerShell.
- Fluent in English, both written and spoken.
- Self-motivated with the ability to work independently and collaboratively in challenging environments.
Nice to Have
- Understanding of Operating Systems : Windows, Unix / Linux, macOS.
- Knowledge of Windows Server administration.
- Understanding of cybersecurity concepts like the cyber kill chain, TTP, threat intelligence, and malware distribution networks.
- Knowledge of security principles such as defense in depth, BYOD management, data loss prevention, risk assessment, and security metrics.
- Over three years of experience in a SOC environment.
- Strong analytical, problem-solving, communication, and leadership skills.
- Experience with AWS or Azure infrastructure.
- Previous malware reverse engineering experience.
- Relevant certifications (e.g., GCIH, GCFA, GCFE, GREM, CISSP) are advantageous.
What We Offer
- Medical insurance
- Birthday day off
- A dynamic work environment focused on innovation and collaboration
Industry : IT Services and IT Consulting
Employment Type : Full-time
J-18808-Ljbffr