Professionals at Ackcent Cybersecurity have a common goal: to improve the security of our customers, protect their assets from cyber threats, and provide high-quality service through communication and care. In this position, you will be part of our SOC Team, responsible for security threat monitoring and incident handling. You will help secure and defend our clients' assets.
We seek professionals with experience in cybersecurity and a comprehensive understanding of Networks, Security Architecture, and Security Monitoring Tools.
As a key member of the Ackcent team, you will lead the handling of security threats and incidents, improve and maintain tools and procedures, and conduct forensics and malware analysis for mitigation and threat containment. As a senior team member, you will train and support junior colleagues and collaborate with other departments on security initiatives.
Responsibilities
- Analyze and verify security threat monitoring alerts to identify, classify, and prioritize incidents.
- Create, improve, and maintain security monitoring alerts based on data correlation.
- Operate and maintain IDS/IPS systems, collaborating with security and network architects to enhance security defenses.
- Lead responses to security incidents, working with customers and IT providers, adhering to SLAs.
- Conduct forensics and malware analysis to identify indicators of compromise, assessing incident scope and impact.
- Report findings to the SOC Manager and the customer's CISO/CIO.
- Train and advise junior team members.
- Perform proactive research on the cyber threat landscape to keep tools and processes up to date.
- Ensure contractual obligations and SLAs are met or exceeded.
- Manage priorities, deadlines, and deliverables.
- Develop and improve SOC procedures and tools.
Required Skills & Experience
- Bachelor's degree in Computer or Telecommunications Engineering or related field.
- Over 3 years of experience in information security.
- Experience working in a SOC environment.
- Strong understanding of network fundamentals and internet protocols.
- Knowledge of system administration and security architecture.
- Experience with security monitoring tools (firewalls, IDS/IPS, HIDS, WAF, SIEM).
- Proven experience with at least one IDS technology.
- Scripting skills in Bash, Python, or PowerShell.
- Fluent in English, both written and spoken.
- Self-motivated with the ability to work independently and in teams in challenging environments.
Nice to Have
- Understanding of Operating Systems (Windows, Unix/Linux, macOS).
- Knowledge of Windows Server administration.
- Understanding of cybersecurity concepts like the cyber kill chain, TTPs, threat intelligence, and malware distribution networks.
- Knowledge of security principles such as defense in depth, BYOD, data loss prevention, risk assessment, and security metrics.
- Experience in a SOC environment for three or more years.
- Strong analytical, problem-solving, and communication skills.
- Experience with AWS or Azure infrastructure.
- Previous malware reverse engineering experience.
- Relevant certifications (GCIH, GCFA, GCFE, GREM, CISSP) are advantageous.
What We Offer
- Competitive salary
- Medical insurance
- Remote work
- Birthday off
- Flexible hours
- A dynamic environment focused on innovation and collaboration
Industry: IT Services and Consulting
Employment Type: Full-time