Home

SOC Engineer || Mountain View, CA/ Littleton, CO (Day one Onsite) || Strong in Python, Elastic Search and hands on coding exp at Mountain, Wisconsin, USA
Email: [email protected]
HI All,

10+

Share Profile  

SOC Engineer

Mountain View, CA/ Littleton, CO (Day one
Onsite)

Strong in Python ,Elastic Search and hands on coding exp

Job Summary:

The SOC Engineer will monitor, detect, analyze, and respond to security incidents affecting the SPC environment. You will leverage your automation skills to streamline SOC operations and enhance incident response capabilities. The candidate must have robust oral and written documentation and communication skills. This position should bring prior analytical problem-solving skills, sound judgment, knowledge, and expertise in IT Security.

Job Responsibilities:

Monitor security event management systems (SIEM) and other tools to detect security incidents and anomalies.

Investigate and analyze security incidents, determine root causes, assist in vulnerability assessments, and manage remediation efforts.

Develop and implement automation scripts and workflows to improve SOC efficiency, including incident response automation and playbook creation.

Perform in-depth analysis of logs to identify indicators of compromise (IOCs) and potential security breaches.

Develop and maintain incident response plans and procedures to ensure optimal response to security incidents.

Coordinate with analysts and other stakeholders to promptly escalate and respond to security incidents.

Provide guidance and mentorship to analysts on incident detection, analysis, and response techniques.

Participate in security incident tabletop exercises and simulations to test and improve incident response capabilities.

Stay up-to-date with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.

Contribute to continuous improvement initiatives within the SOC, including process refinement and tool enhancement, and generate SLI/SLO-related metrics to show improvements.

Act as one of the information security subject matter experts for the Incident Response team and assist in escalations impacting Joyent.

Yearly travel may be required for approximately one to two weeks per year, subject to change as business requirements evolve.

Qualifications and Requirements

Must have a solid understanding of information technology and security best practices.

Hands-on cloud experience; one or more of AWS, Azure, GCP -  desired but not required.

Collaborate effectively with teams across different functions.

Must possess a basic understanding of network routers, switches, and firewalls.

Passionate about automation, performance, reliability, visibility, and finding creative solutions to complex security issues using Python.

Proficient in Linux, including understanding security hardening for Linux, web applications, and databases such as PostgreSQL and MariaDB.

Experience with Kubernetes is a plus.

Familiarity with open-source security tools and applications.

Strong attention to detail with exceptional organizational skills

Availability to work in a 24/7 environment, including weekends and holidays, with on-call duties.

5+ Years of experience

Must have skills:

In-depth experience with elastic databases (ELK, Postgres, Database Transformation)

In-depth Experience in Postgres

Very Strong experience in Python (Programing experience)

Experience in structured and non-structured databases

Log Transformation and Event Collection

Should be able to transform the Logs to different database formats using Automation

Experience in Yara

Experience in Wazuh and Splunk

Handle more than 1 billion log and events per month

Monitor security event management systems (SIEM) and other tools to detect security incidents and anomalies

Investigate and analyze security incidents, determine root causes, assist in vulnerability assessments, and manage remediation efforts.

Develop and implement automation scripts and workflows to improve SOC efficiency, including incident response automation and playbook creation.

Perform in-depth analysis of logs to identify indicators of compromise (IOCs) and potential security breaches.

Participate in security incident tabletop exercises and simulations to test and improve incident response capabilities.

Stay up to date with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.

Must have a solid understanding of information technology and security best practices

Hands-on cloud experience; one or more of AWS, Azure, GCP

Experience with Kubernetes is a plus

Proficient in Linux, including understanding security hardening for Linux, web applications, and databases such as PostgreSQL and MariaDB.

5 to 10 years of experience.

Thanks & Regards

Mohammad Faisal

[email protected]

--

Keywords: information technology California Colorado Maryland
SOC Engineer || Mountain View, CA/ Littleton, CO (Day one Onsite) || Strong in Python, Elastic Search and hands on coding exp
[email protected]
[email protected]
View all
Thu Dec 05 21:13:00 UTC 2024

To remove this job post send "job_kill 1987626" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 57

Location: Mountain View, California