Tech Stack
AWSElasticSearchLinuxLogstashPython
About the role
- Integration of new data sources into the SOC, including AWS, AI platforms, and crypto systems.
- Development and refinement of detection rules for identifying suspicious activity in logs.
- Automation of incident response processes using playbooks and orchestration tools.
- Conducting Red Team tests and attack simulations in accordance with DORA standards and others.
- Active participation in threat hunting and continuous improvement of the threat detection system.
- Maintenance and updates of existing SOC tools to ensure their relevance and effectiveness.
- Implementation of new tools and solutions (including open-source and AI tools) to enhance SOC capabilities.
- Collaboration with other teams to align SOC functions with technical and business requirements.
- Participation in on-call rotations and real-time incident response.
- Preparation and maintenance of internal SOC documentation, procedures, and knowledge bases.
Requirements
- 5+ years of experience in the field of information security, preferably within a SOC or related areas.
- Hands-on experience in administering and configuring the ELK stack (Elasticsearch, Logstash, Kibana).
- Solid knowledge of Windows Server and Linux (Ubuntu) administration, including practical experience with Active Directory.
- Scripting and automation skills using Bash, PowerShell, or Python for security and incident response tasks.
- Experience in configuring and maintaining Incident Response Platforms (IRP) and SOC automation tools.
- Proficiency in writing correlation rules, custom parsers, and integrating non-standard data sources into SIEM systems.
- Strong knowledge of regular expressions (regex).
- Understanding of security specifics in environments using AWS, AI platforms, and crypto systems — particularly in the areas of log collection and incident analysis.
- Fluency in English.