Professionals at Ackcent Cybersecurity share a common goal : to enhance our customers' security, protect their assets from cyber threats, and deliver high-quality service through effective communication and customer care.
In this position, you will be part of our SOC Team responsible for security threat monitoring and incident handling. You will help secure and defend our clients' assets. We seek professionals with cybersecurity experience and a comprehensive understanding of Networks, Security Architecture, and Security Monitoring Tools.
As a key team member, you will lead handling security threats and incidents, improve and maintain tools and procedures, and conduct forensics and malware analysis for mitigation and threat containment. This senior role includes training and supporting junior team members and collaborating with other departments on security initiatives and decisions.
Key Responsibilities
- Analyze and verify security threat monitoring alerts to identify, classify, and prioritize incidents.
- Create, improve, and maintain security monitoring alerts based on data correlation.
- Operate and maintain IDS / IPS systems, working closely with security and network architects.
- Lead responses to security incidents and investigations, coordinating with customers and IT providers, adhering to SLAs.
- Conduct forensics and malware analysis to identify indicators of compromise, assess incident scope and impact.
- Report findings to the SOC Manager and the involved CISO / CIO.
- Train and advise junior team members.
- Perform proactive research on the latest security threats and vulnerabilities to keep tools and processes current.
- Ensure contractual obligations and SLAs are met or exceeded.
- Manage priorities, deadlines, and deliverables.
- Develop and improve SOC tools and operational procedures.
Required Skills & Experience
Degree in Computer / Telecommunications Engineering or related field.Over 3 years of relevant experience in information security.Experience working in a SOC environment.Strong understanding of network fundamentals and internet protocols.Knowledge of system administration and security architecture.Experience with security monitoring tools (firewalls, IDS / IPS, HIDS, WAF, SIEM).Experience with at least one IDS technology.Scripting skills in Bash, Python, or PowerShell.Fluent in English, both written and spoken.Self-motivated with the ability to work independently and in teams in challenging environments.Nice to Have
Proficiency with Windows, Unix / Linux, and OSX operating systems.Knowledge of Windows server administration.Understanding of the cybersecurity landscape, including kill chain, TTPs, Threat Intelligence, malware distribution.Knowledge of security concepts like defense in depth, BYOD, data loss prevention, risk assessment, and security metrics.Over three years of SOC experience.Strong analytical, problem-solving, communication, and leadership skills.Experience with AWS or Azure infrastructure.Previous malware reverse engineering experience.Relevant certifications (GCIH, GCFA, GCFE, GREM, CISSP) are advantageous.What We Offer
Competitive salaryMedical insuranceRemote workBirthday offFlexible hoursInnovative and collaborative work environmentJ-18808-Ljbffr