Your Role
Clearly and logically communicate and build support for your ideas,
Response and analysis of security issues created by automatic systems and people,
Troubleshoot technical issues within complex systems,
Proactively identify gaps, risks and issues and suggest possible solutions,
Operate our key security tools and constantly tune and build automated response playbooks,
Define security configurations for endpoint, network, e-mail security, etc.,
Design automated workflows to streamline security operations,
Analyzes and estimates feasibility, costs, time, and work effort needed to design and implement moderately complex technical solutions,
Monitor and proactively manage products and services to assure their performance, availability, security, and capacity,
Research, analyze and formulate recommendations regarding technologies, products, and solutions to fulfill requirements within the enterprise,
Act as a consultant on special projects for multiple teams,
Provide coaching and guidance to more junior staff,
Evaluate and propose best practices/standards, process improvements, and security policy to provide the highest levels of availability, security and data privacy.
What you’ll bring
Able to take ownership of tasks and see through completion,
Willingness to learn, absorb and correlate technical information and then be able to interpret and simplify it,
Well organized and able to leverage best practices, able to thrive in fast-paced environment, and most importantly, have the ability to approach problems with a can-do attitude,
Ability to establish priorities, work independently and proceed with objectives,
Strong communication skills to work with both collaborative cross-functional team of peers and departments within the company,
Understanding of various security technologies including AV, network security, e-mail security, SIEM, etc.,
Understanding of OS and application logging, with a focus on security event logging,
Understanding of security operations concepts,
Practical knowledge of basic networking protocols (TCP/IP stack – reading pcaps),
Experience with Microsoft Windows or Linux or MacOS Operating Systems on a command line level,
Experience with one or more programming or scripting language such as Python, VBScript, Bash, or others,
Any graduate