Professionals at Ackcent Cybersecurity share a common goal: to enhance our customers' security, protect their assets from cyber threats, and provide high-quality service through effective communication and customer care. In this role, you will be part of our SOC Team, responsible for security threat monitoring and incident handling, helping to secure and defend our clients’ assets.
We seek professionals with experience in cybersecurity and a comprehensive understanding of Networks, Security Architecture, and Security Monitoring Tools.
As a key team member, you will lead the handling of security threats and incidents, improve and maintain tools and procedures, and conduct forensics and malware analysis for mitigation and threat containment. This senior role includes training and supporting junior team members and collaborating with other departments on initiatives and decisions related to Security Services.
Responsibilities
- Analyze and verify security threat monitoring alerts to identify, classify, and prioritize incidents.
- Create, improve, and maintain security monitoring alerts based on data correlation.
- Operate and maintain IDS/IPS systems, working closely with security and network architects to enhance security defenses.
- Lead responses to security incidents and investigations, coordinating with customers and IT providers, adhering to SLA requirements.
- Conduct forensic and malware analysis to identify indicators of compromise, assessing incident scope and impact.
- Report findings to the SOC Manager and relevant customer CISOs/CIOs.
- Provide training and guidance to junior team members.
- Proactively monitor the cyber threat landscape through research to keep tools and processes current.
- Ensure contractual obligations and SLAs are met or exceeded.
- Manage priorities, deadlines, and deliverables effectively.
- Develop and implement improvements to SOC tools and operations.
Required Skills & Experience
- Degree in Computer or Telecommunications Engineering or a related field.
- Over 3 years of relevant experience in information security.
- Experience in a Security Operations Center (SOC) environment.
- Strong understanding of network fundamentals and Internet protocols.
- Knowledge of system administration and security architecture.
- Experience with security monitoring tools (firewalls, IDS/IPS, HIDS, WAF, SIEM).
- Proven experience with at least one IDS technology.
- Scripting skills in Bash, Python, or PowerShell.
- Fluent in English (written and spoken).
- Self-motivated with the ability to work independently and collaboratively in challenging environments.
Nice to Have
- Understanding of Operating Systems (Windows, Unix/Linux, macOS).
- Knowledge of Windows Server administration.
- Understanding of cybersecurity concepts like the cyber kill chain, TTP, threat intelligence, and malware distribution networks.
- Knowledge of defense in depth, BYOD management, data loss prevention, risk assessment, and security metrics.
- Experience over three years in a SOC environment.
- Strong analytical, problem-solving, communication, presentation, and leadership skills.
- Experience with AWS or Azure infrastructure.
- Previous malware reverse engineering experience.
- Relevant certifications (GCIH, GCFA, GCFE, GREM, CISSP) are advantageous.
What We Offer
- Medical insurance
- Birthday day off
- A dynamic, innovative, and collaborative work environment
Industry: IT Services and IT Consulting
Employment Type: Full-time