About the position
Rimes Technologies is seeking a SOC Analyst to join their technology team and enhance their SOC capabilities. The main objective of this role is to prevent cyber attacks and improve cyber incident response capabilities. The candidate will work closely with the Information Security team and report to the Head of Information Security. Responsibilities include monitoring, analyzing, and responding to security issues, conducting forensics and log analysis, developing response playbooks, and optimizing tooling coverage and internal processes. The ideal candidate should have 2 years of experience in IT Infrastructure, Networking, or Cybersecurity, and a strong understanding of network principles and security technologies.
Responsibilities
- Monitor, analyze and respond to security issues
- Conduct host forensics, network forensics, and log analysis in support of incident response investigations
- Investigate to identify root cause, including attack vector, exploitation, and other techniques utilized to bypass security controls
- Develop and enhance response playbooks
- Perform training and knowledge transfers to other technical teams
- Continuous optimization of tooling coverage and effectiveness
- Continuous optimization of internal processes
- Vulnerability management/reporting and processing findings for the technical teams to action
- Interface with security suppliers to drive initiatives and monitor services provided
Requirements
- 2 years' experience in IT Infrastructure, Networking or Cybersecurity
- Strong understanding of network principles, such as TCP/IP, DNS, routing and switching
- Understanding and working knowledge of the following security technologies:
- Firewalls (Palo Alto, Meraki, Azure)
- IDS/IPS (Palo Alto, Meraki)
Benefits
- Competitive benefits package
- Opportunity for growth and expansion into new markets and geographies
- Enhancing SOC capabilities and cyber incident response
- Working with a small but established Information Security team
- Monitoring, analyzing, and responding to security issues
- Conducting host forensics, network forensics, and log analysis
- Developing and enhancing response playbooks
- Training and knowledge transfers to other technical teams
- Continuous optimization of tooling coverage and effectiveness
- Continuous optimization of internal processes
- Vulnerability management and reporting
- Interface with security suppliers
- Promotion of diversity and inclusion throughout the business