Tech Stack
CloudCyber SecurityDNSFirewallsJavaScriptSplunkTCP/IP
About the role
- Monitor security alerts and events using SIEM and other security tools
- Perform initial triage and investigation of potential security incidents
- Respond to and escalate incidents based on severity and impact
- Conduct log analysis and forensic investigations to identify root causes
- Collaborate with IT and security teams to contain and remediate threats
- Maintain and update incident response documentation and playbooks
- Stay informed on the latest cybersecurity threats, vulnerabilities, and trends
- Support compliance efforts and internal/external audits (e.g. PCI-DSS, SOC2 Type2, HIPAA, ISO27001)
- Participate in threat hunting and proactive security assessments
- Work closely with the Information Security team to identify potential threats and escalate incidents as necessary.
Requirements
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field.
- Industry certifications preferred: CompTIA Security+, Certified SOC Analyst, GIAC Security Essentials, Certified Ethical Hacker
- Fundamental knowledge of IT, Cloud, and industry security practices
- Experience with SIEM platforms (e.g., Splunk, Microsoft Sentinel)
- Familiarity with firewalls, IDS/IPS, endpoint protection, and vulnerability scanners
- Understanding of TCP/IP, DNS, HTTP, and other network protocols
- Basic scripting knowledge (PowerShell) is a plus
- Knowledge of MITRE ATT&CK framework and threat intelligence sources
- Strong analytical and problem-solving abilities
- Excellent verbal and written communication skills
- Ability to work independently and collaboratively in a fast-paced environment
- High attention to detail and a proactive mindset
- Experience working in a BPO environment is plus.