The Security Operations Engineer should possess a good understanding of security technologies and how to implement and maintain them. They should also be able to demonstrate competency and experience in the areas of technology risks & controls over areas such as access management, change management, & computer operations; exposure to DevOps & Agile.
We would expect from you to:
Keep up to date with the latest security and technology developments.
Research/evaluate emerging cyber security threats and ways to mitigate them.
Anticipate security alerts, incidents and disasters and reduce their likelihood.
Monitor security systems and logs and manage the SIEM, including but not limited to: Office O365, AntiVirus, Web Filtering, IDS/IPS Systems, fine tune scope and develop compliance monitoring controls, SPAM and phishing mail investigation, cloud environment including AWS and Azure.
Perform Vulnerability assessments.
Produce Security status reports, including but not limited to;
Privileged Access Reviews
Monitor for attacks, intrusions and unusual, unauthorised or illegal activity.
Test and evaluate security products.
Participate in change management for Infrastructure and hosting.
Security Threat Advisory Management.
Perform risk analysis and provide Policy and Operational exception approvals.
Investigate security alerts and provide incident response.
Monitor identity and access management, including monitoring for abuse of permissions by authorised system users.
Assist in enforcement of ISMS security policies via designing and implementing security.
Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues.
Facilitate use of technology-based tools or methodologies, monitor security metrics and implement gaps to improve security posture.
Demonstrate a general knowledge of market trends, competitor activities, CPA offerings and service lines.
Participate in proposal development efforts (RFP).
Identifying opportunities for the organisation to effectively mitigate risk and improve business performance.
Adherence to audit observations and work upon the Improvement areas.
Develop and maintain Hardening benchmarks in line with industry standards (CIS, NIST etc).
Our ideal match has:
Has at least 2 years’ experience working within a security operations team or as a security operations analyst.
Must have demonstrable experience and knowledge of working with several of the following technologies;
Network protocols and packet analysis tools
Windows, UNIX and Linux operating systems
Next Gen Firewalls (ideal would be Cisco ASA/Firepower, Checkpoint, Sophos or F5)
Enterprise Endpoint Protection systems (McAfee EPO, Kaspersky, Symantec etc)
Security Incident and Event Monitoring [SIEM] (LogRhythm, Alienvault, Splunk or similar Enterprise level system)
Web Filtering Technologies (Websense, Forcepoint, Symantec etc)
Office 365 Security Monitoring, Reporting and implementation
Proven working experience as Internal IT Security Consultant. Ability to prioritize tasks, work on multiple assignments, manage ambiguity, and work independently or as part of a team with professionals at all levels.
Willingness to travel within and out of country on engagements.
Excellent written and spoken English.
One or more of the following security certifications;
CEH: Certified Ethical Hacker
ECSA: EC-Council Certified Security Analyst
GSEC / GCIH / GCIA: GIAC Security Certifications
CISSP, CCSP, Security+ or other relevant security qualification.
Tanium or other EDR tools.
Azure and AWS security methodologies and best practices.
A knowledgeable, high-achieving, experienced and fun team.
The chance to be part of a rapidly growing company and the next success story.
Free and healthy meals for all our colleagues.
Private health insurance.
We take care of the people we hire and the teams we build. We mind.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.