SOC Engineer || Mountain View, CA/ Littleton, CO (Day one Onsite) || Strong in Python, Elastic Search and hands on coding exp at Mountain, Wisconsin, USA |
Email: [email protected] |
HI All, 10+ Share Profile SOC Engineer Mountain View, CA/ Littleton, CO (Day one Onsite) Strong in Python ,Elastic Search and hands on coding exp Job Summary: The SOC Engineer will monitor, detect, analyze, and respond to security incidents affecting the SPC environment. You will leverage your automation skills to streamline SOC operations and enhance incident response capabilities. The candidate must have robust oral and written documentation and communication skills. This position should bring prior analytical problem-solving skills, sound judgment, knowledge, and expertise in IT Security. Job Responsibilities: Monitor security event management systems (SIEM) and other tools to detect security incidents and anomalies. Investigate and analyze security incidents, determine root causes, assist in vulnerability assessments, and manage remediation efforts. Develop and implement automation scripts and workflows to improve SOC efficiency, including incident response automation and playbook creation. Perform in-depth analysis of logs to identify indicators of compromise (IOCs) and potential security breaches. Develop and maintain incident response plans and procedures to ensure optimal response to security incidents. Coordinate with analysts and other stakeholders to promptly escalate and respond to security incidents. Provide guidance and mentorship to analysts on incident detection, analysis, and response techniques. Participate in security incident tabletop exercises and simulations to test and improve incident response capabilities. Stay up-to-date with the latest cybersecurity threats, vulnerabilities, and mitigation techniques. Contribute to continuous improvement initiatives within the SOC, including process refinement and tool enhancement, and generate SLI/SLO-related metrics to show improvements. Act as one of the information security subject matter experts for the Incident Response team and assist in escalations impacting Joyent. Yearly travel may be required for approximately one to two weeks per year, subject to change as business requirements evolve. Qualifications and Requirements Must have a solid understanding of information technology and security best practices. Hands-on cloud experience; one or more of AWS, Azure, GCP - desired but not required. Collaborate effectively with teams across different functions. Must possess a basic understanding of network routers, switches, and firewalls. Passionate about automation, performance, reliability, visibility, and finding creative solutions to complex security issues using Python. Proficient in Linux, including understanding security hardening for Linux, web applications, and databases such as PostgreSQL and MariaDB. Experience with Kubernetes is a plus. Familiarity with open-source security tools and applications. Strong attention to detail with exceptional organizational skills Availability to work in a 24/7 environment, including weekends and holidays, with on-call duties. 5+ Years of experience Must have skills: In-depth experience with elastic databases (ELK, Postgres, Database Transformation) In-depth Experience in Postgres Very Strong experience in Python (Programing experience) Experience in structured and non-structured databases Log Transformation and Event Collection Should be able to transform the Logs to different database formats using Automation Experience in Yara Experience in Wazuh and Splunk Handle more than 1 billion log and events per month Monitor security event management systems (SIEM) and other tools to detect security incidents and anomalies Investigate and analyze security incidents, determine root causes, assist in vulnerability assessments, and manage remediation efforts. Develop and implement automation scripts and workflows to improve SOC efficiency, including incident response automation and playbook creation. Perform in-depth analysis of logs to identify indicators of compromise (IOCs) and potential security breaches. Participate in security incident tabletop exercises and simulations to test and improve incident response capabilities. Stay up to date with the latest cybersecurity threats, vulnerabilities, and mitigation techniques. Must have a solid understanding of information technology and security best practices Hands-on cloud experience; one or more of AWS, Azure, GCP Experience with Kubernetes is a plus Proficient in Linux, including understanding security hardening for Linux, web applications, and databases such as PostgreSQL and MariaDB. 5 to 10 years of experience. Thanks & Regards Mohammad Faisal [email protected] -- Keywords: information technology California Colorado Maryland SOC Engineer || Mountain View, CA/ Littleton, CO (Day one Onsite) || Strong in Python, Elastic Search and hands on coding exp [email protected] |
[email protected] View all |
Thu Dec 05 21:13:00 UTC 2024 |