The position involves leading advanced incident detection, investigation, and analysis efforts. The candidate will correlate data from various sources such as SIEM, EDR, IDS/IPS, and firewalls to identify and analyze potential incidents. Deep-dive investigations will be performed to determine the root cause, scope, and impact of incidents, applying frameworks like MITRE ATT&CK for adversary TTP identification. The role requires guiding preparation, identification, containment, eradication, and recovery actions in collaboration with SOC, forensics, and engineering teams, ensuring incident handling aligns with established guidelines, response plans, and playbooks. The candidate will analyze telemetry, logs, and behavioral patterns for indicators of compromise or attack, and work with forensic teams to ensure proper collection, preservation, and analysis of digital evidence. Coordination with forensics teams to maintain chain-of-custody and evidence integrity is essential. The role also includes developing and enhancing SOC processes, playbooks, and detection capabilities, performing threat intelligence collection, analysis, and dissemination, and providing real-time guidance during active incidents. Collaboration with stakeholders to strengthen the overall cybersecurity posture and addressing identified vulnerabilities with engineering, IT, and cloud teams is expected. Participation in tool evaluations and providing executive-level briefings on security events and SOC performance are also part of the responsibilities.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Industry
Computing Infrastructure Providers, Data Processing, Web Hosting, and Related Services
Education Level
Master's degree
Number of Employees
5,001-10,000 employees