ππ¨π₯π ππ―ππ«π―π’ππ°:
As a Cybersecurity Specialist (SOC Level 3), you will lead the detection, analysis, and mitigation of complex security incidents. You will be responsible for advanced threat hunting, incident response, and guiding junior analysts. Your expertise will drive continuous improvements in SOC processes and security tools to strengthen the organizationβs overall security posture.
Key Responsibilities:
β Serve as the senior escalation point for complex security incidents and provide expert analysis.
β Proactively hunt for threats, vulnerabilities, and incidents within the organization.
β Lead investigations, root cause analysis, and incident remediation efforts.
β Collaborate with IT, risk management, and executive teams to manage and mitigate risks.
β Perform threat analysis and integrate findings into detection mechanisms.
β Develop and maintain SOC playbooks and incident response procedures.
β Mentor junior SOC analysts and contribute to team skill development.
Required Experience & Skills:
β Expertise in Microsoft Security & Compliance solutions (e.g., M365 Defender, Sentinel SIEM).
β Strong background in threat detection, incident response, and security tool management.
β Proficiency in writing and executing queries (KQL, SPL) for security analysis.
β Familiarity with ServiceNow, ITIL processes, and service request management.
β Experience in threat intelligence, malware analysis, and digital forensics.
β Ability to work effectively in a high-pressure, 24Γ7 security environment.
Qualifications:
β Bachelorβs degree in Cybersecurity or related field.
β Certifications such as GCIH, CISSP, OSCP, or CEH.
Preferred Qualifications:
β Masterβs degree in Cybersecurity.
β Advanced certifications in threat intelligence or digital forensics (e.g., GCFA, GREM).
Performance Criteria:
β Timeliness and effectiveness in incident response.
β Quality of root cause analysis and incident reporting.
β Contribution to SOC process improvements and team mentorship.
Any Graduate