Technical Specialist, Security Operations

2 days ago
0 Applied
Expires on: Oct 20 2022

Ref. No 00001194


As a Technical Specialist in SOC you will use defensive measures and information collected from a variety of sources to detect, analyse, and mitigate events that occur or might occur within the network in order to protect information, information systems, and networks from threats. Guide and mentor, a team of security operations center analysts. 

What we look for:

  • Bachelor's degree in related field or relevant experience.  
  • Minimum of 5 years of experience working in a Security Operations Center functioning in a Security Analysis, Incident Response, Attack Analysis, or Computer Network Defense (CND) capacity. 
  • This role requires an effective communication skills and leadership traits. 
  • Effectively review event details and conduct technical analysis, communicate to technical audiences within the global cyber organization and other technology groups. 
  • Capability to guide and mentor junior SOC members. 
  • TCP/IP, IPv6, UNIX, Windows, HTTP and related network tools is required. 
  • Comprehensive understanding of network services, vulnerabilities and attacks. 
  • Skilled in conducting vulnerability scans and recognizing vulnerabilities in security systems. 
  • Knowledge of Intrusion Detection System (IDS) tools and applications. 
  • Comprehensive knowledge of network design, defense-in-depth principles, and network security architecture. 
  • Effectively contribute to manage / improve day to day SOC operations.   
  • Receive and analyse network alerts from various sources within the enterprise and determine possible causes of such alerts. 
  • Provide timely detection, identification, and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities. 
  • Identifies false-positives and false-negatives from alerting. 
  • Create and test new alerting opportunities based on analytical methods like anomaly detection, or to detect malicious techniques.
  • Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation. 
  • Aide in cybersecurity incident response efforts. 
Security Operations
network tools
network services, vulnerabilities and attacks
Intrusion Detection System (IDS) tools
network design
network security architecture
Industry Sector