Security Operations Analyst at KUBRA ensuring data protection and responding to security incidents. Join a dynamic team focused on continuous improvement in cybersecurity.
Responsibilities
Security Infrastructure Management: Maintain and optimize the security infrastructure (Firewalls, IDS/IPS, AV, SIEM, FIM, servers, etc.) with a specific focus on maintaining Exabeam SIEM and CrowdStrike (managing EDR, FIM, and DLP modules).
Cloud Security Operations: Execute AWS cloud security operations, monitoring specific services (e.g., GuardDuty, Security Hub, CloudTrail) to secure cloud workloads and respond to cloud-native threats.
Incident Response: Monitor systems, software, and skills to stay ahead of emerging threats: Lead or participate in security investigations and Assist during Incident Response and Recovery activities.
Data Pipeline Management: Manage and optimize security data pipelines using Cribl to ensure efficient log routing, parsing, and data reduction before ingestion.
Infrastructure as Code (IaC): Utilize IaC principles (specifically Terraform) to deploy, maintain, and audit security configurations and infrastructure.
Network Security: Perform firewall operational tasks as approved.
Governance & Risk: Maintain and enforce KUBRA’s IT management control framework that defines the institution’s overall approach to IT risk and control.
Incident Management: Participate in on-call rotation to respond, investigate and resolve Security Incidents.
Alert Coordination: Track and action alerts to ensure proper response is taken by coordinating the work efforts of internal teams and actions required of external service providers.
SIEM Optimization: Apply understanding of environment and operational issues to work with external or internal parties for implementation or optimization of specific Exabeam SIEM use cases to help improve detection and response.
Threat Intelligence: Maintain the vulnerability security digest, monitor threat feeds, and provide regular threat intelligence updates.
Access Reviews: Conduct access control reviews on a case-by-case basis to systems and work with internal and external resources to update user control lists and provide reports.
Audit & Compliance: Assist in remediation tasks related to audits/penetration tests.
Training & Testing: Participate in internal and external table-top exercises related to cybersecurity.
Documentation: Assist in development of process and procedure documents for Security Operations.
Policy Guidance: Evaluate and provide guidance to exemption requests as per corporate policy and standards, to advise of risk involved.
Requirements
A minimum of 2 years of experience operating and working in a functional SOC environment.
A minimum of 2 years of experience in a Security Operations role.
2+ years of experience in Incident Management and related processes.
Exabeam: Proven experience operating Exabeam SIEM is required.
CrowdStrike: Hands-on experience with CrowdStrike EDR, FIM (File Integrity Monitoring), and DLP (Data Loss Prevention) is required.
AWS Security: Strong operational knowledge of AWS Cloud Security operations is required.
Cribl: Experience with Cribl for log shaping and routing is highly desirable.
Terraform: Knowledge of Terraform or other Infrastructure as Code (IaC) tools is considered a strong asset.
Corporate Security Operations Lead managing security operations for Carbon60 in a hybrid environment. Involves monitoring, incident response, and security controls across cloud and internal systems.
Product Security Incident Response Manager at Autodesk responsible for external security assessments, penetration testing, and team leadership. Balancing technical work with mentorship to improve security posture.
Senior Security Operations Specialist protecting Relay's digital banking platform from security threats. Implementing advanced threat detection and incident response protocols for optimal business security.
Security Operations Specialist monitoring and responding to incidents for Fluent, Inc. Collaborating across teams to develop and maintain security best practices and compliance frameworks.
Cyber Defender (Senior SOC Analyst) at Ontinue focusing on detection and response in security operations. Collaborating with teams to enhance managed security services using Microsoft tools.
Security Operations Manager at Apollo.io ensuring effective incident detection and response in a remote environment. Leading a high - performing team and improving security processes.
Sr. Google SecOps Engineer dedicated to onboarding and maintaining Sec Ops environments for Optiv clients. Collaborating in a 24x7 Security Operations Center to provide critical services.
Lead incident response team managing critical incidents across IT, eCommerce, store ops & supply chain. Contract - to - permanent role with hybrid work.
Security Manager enhancing KUBRA's security posture through strategic decision making and collaboration on security processes. Protecting data assets from threats while working closely with technology and business stakeholders.
SOC Engineer role at Just Eat Takeaway.com involves monitoring and supporting global platform changes. Focus on automation and engineering support in a fast - paced, agile environment.