Professionals at Ackcent Cybersecurity share a common goal: to enhance our customers' security, safeguard their assets from cyber threats, and deliver high-quality service through effective communication and customer care. In this role, you will be part of our SOC Team, responsible for security threat monitoring and incident handling, helping to secure and defend our clients’ assets.
We seek professionals with cybersecurity experience and a comprehensive understanding of Networks, Security Architecture, and Security Monitoring Tools.
As a key team member, you will lead security threat and incident management, improve and maintain tools and procedures, and conduct forensics and malware analysis for mitigation and threat containment. As a senior member, you will also train and support junior team members and collaborate across departments on various security initiatives.
Key Responsibilities
- Analyze and verify security threat monitoring alerts to identify, classify, and prioritize incidents.
- Create, enhance, and maintain security monitoring alerts based on data correlation.
- Operate and maintain IDS/IPS systems, working closely with security and network architects.
- Lead responses to security incidents, coordinate with customers and IT providers, and meet SLA requirements.
- Conduct forensic and malware analysis to identify indicators of compromise, evaluate incident scope and impact.
- Report findings to the SOC Manager and relevant customer CISOs/CIOs.
- Train and advise junior team members.
- Perform proactive monitoring by researching the latest security threats and vulnerabilities.
- Ensure compliance with contractual obligations and SLAs.
- Manage priorities, deadlines, and deliverables.
- Improve SOC tools and operational procedures.
Required Skills & Experience
- Degree in Computer or Telecommunications Engineering or a related field.
- Over 3 years of relevant experience in information security.
- Experience in a SOC environment.
- Strong understanding of network fundamentals and internet protocols.
- Knowledge of system administration and security architecture.
- Experience with security monitoring tools (firewalls, IDS/IPS, HIDS, WAF, SIEM).
- Experience with at least one IDS technology.
- Scripting skills in Bash, Python, or PowerShell.
- Fluent in English (spoken and written).
- Self-motivated with the ability to work independently and collaboratively.
Nice to Have
- Understanding of Operating Systems: Windows, Unix/Linux, macOS.
- Knowledge of Windows Server administration.
- Understanding of cybersecurity concepts like the kill chain, TTPs, threat intelligence, malware distribution.
- Knowledge of security concepts such as defense in depth, BYOD, data loss prevention, risk assessment, and security metrics.
- Experience in a SOC for 3+ years.
- Strong analytical, problem-solving, communication, and leadership skills.
- Experience with AWS or Azure.
- Previous malware reverse engineering experience.
- Relevant certifications (GCIH, GCFA, GCFE, GREM, CISSP) are a plus.
What We Offer
- Medical insurance.
- Birthday off.
- A dynamic, innovative, and collaborative work environment.