Analyzing and resolving complex incidents detected by SOC, including making decisions on escalation and implementing appropriate corrective actions
Creating and optimizing advanced SOC scenarios to increase the effectiveness of threat detection
Preparing comprehensive reports and recommendations based on the results of incident analysis and SOC activities
Developing, implementing and maintaining advanced SIEM, SOAR systems, including implementing non-standard integrations and process automation
Performing Cyber Threat Intelligence tasks based on the latest techniques and tools
Cooperating with IT and business teams to improve the overall level of security of the organization's infrastructure
Requirements:
Advanced knowledge of IT security and practical experience in analyzing security incidents
Knowledge of technology and infrastructure, in particular: networks (e.g. TCP/IP, network protocols), operating systems (Windows, Linux), databases and applications
Experience in managing and configuring SIEM, SOAR and EDR systems (e.g. creating rules, integration, automation)
Good knowledge of cryptography applications in IT and security protocols (e.g. TLS, IPsec)
Knowledge of attack techniques and tools used by cybercriminals, as well as defense mechanisms
Ability to work in a team and solve problems independently
Experience in implementing projects in the field of DFIR, Threat Hunting or Cyber Threat Intelligence is welcome
Offer:
100% remote work
MultiSport Plus
Group insurance
Medicover Premium
e-learning platform
3 646 - 4 862 USD
Net/month - B2B
Check similar offers
Kierownik Zespołu Reagowania
New
Aplikacje Krytyczne
4.34K - 5.55K USD
Warszawa
Cybersecurity
Pentester
New
Exatel S.A.
Undisclosed Salary
Warszawa
penetration testing
IT Security
Senior Security Engineer – Endpoint Security
New
HSBC Service Delivery
Undisclosed Salary
Kraków
Security
AWS
Jenkins
Specjalista/ka ds. bezpieczeństwa i ciągłości działania