What are the responsibilities and job description for the SOC Engineer position at Ekcel Systems?
Job Details
Hi,
Hope you are doing well. We do have the below position.
Job Title: SOC Engineer
Location: Mountain View, CA (Highly preferred) or Littleton, CO {Need to work onsite from either of these locations)
Duration: 6 months to start with can extend up to 12 months with a possibility of converting to Full-time
Notes from the HM s intake call:
- Hands-on with Python coding***.
- Any database experience like MySQL, NoSQL, etc.,**
- Prior working experience in the security/SOC domain or someone who is willing to work in the SOC environment.*
- We are not looking for a manager, we need a hands-on developer (junior to mid-level).
- Some Linux experience.
- Perform analysis.
- Can perform automation.
- Experience with AWS/Azure/Google Cloud Platform is desired but not mandatory.
- Someone passionate about security.
- Don t need a Network Engineer.
Job Summary:
The SOC Engineer will monitor, detect, analyze, and respond to security incidents affecting the SPC environment. You will leverage your automation skills to streamline SOC operations and enhance incident response capabilities. The candidate must have robust oral and written documentation and communication skills. This position should bring prior analytical problem-solving skills, sound judgment, knowledge, and expertise in IT Security.
Job Responsibilities:
- Monitor security event management systems (targe) and other tools to detect security incidents and anomalies.
- Investigate and analyze security incidents, determine root causes, assist in vulnerability assessments, and manage remediation efforts.
- Develop and implement automation scripts and workflows to improve SOC efficiency, including incident response automation and playbook creation.
- Perform in-depth analysis of logs to identify indicators of compromise (IOCs) and potential security breaches.
- Develop and maintain incident response plans and procedures to ensure optimal response to security incidents.
- Coordinate with analysts and other stakeholders to promptly escalate and respond to security incidents.
- Provide guidance and mentorship to analysts on incident detection, analysis, and response techniques.
- Participate in security incident tabletop exercises and simulations to test and improve incident response capabilities.
- Stay up to date with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Contribute to continuous improvement initiatives within the SOC, including process refinement and tool enhancement, and generate SLI/SLO-related metrics to show improvements.
- Act as one of the information security subject matter experts for the Incident Response team and assist in escalations impacting Joyent.
- Yearly travel may be required for approximately one to two weeks per year, subject to change as business requirements evolve.
Qualifications and Requirements:
- Must have a solid understanding of information technology and security best practices.
- Hands-on cloud experience; one or more of AWS, Azure, Google Cloud Platform - desired but not required.
- Collaborate effectively with teams across different functions.
- Must possess a basic understanding of network routers, switches, and firewalls.
- Passionate about automation, performance, reliability, visibility, and finding creative solutions to complex security issues using Python.
- Proficient in Linux, including understanding security hardening for Linux, web applications, and databases such as PostgreSQL and MariaDB.
- Experience with Kubernetes is a plus.
- Familiarity with open-source security tools and applications.
- Strong attention to detail with exceptional organizational skills
- Availability to work in a 24/7 environment, including weekends and holidays, with on-call duties.
- 5 Years of experience.