- Kateqoriya: Informasiya texnologiyaları
- Şəhər: Bakı
- İş təcrübəsi: 1-3 il
- Maaş: Müsahibə əsasında
- Təhsil: Bakalavr
- İş rejimi: Tam-ştat
- Elan ID: 8685
- E-poçt: [email protected]
- Elanın yerləşdirmə tarixi: 10.12.2024
- Elanın bitmə tarixi: 09.01.2025
Namizədə tələblər
Competencies (Soft Skills):
- Communication
- Collaboration
- Adaptability
- Critical thinking
- Analytical skills
- Attention to detail
- Teamwork
- Problem solving
Personnel specifications:
- Diploma: Bachelor’s degree in computer science or a related technical field.
- Experience: 1-3 years of experience in an IT or security-related role
- Previous experience in a SOC environment is a plus.
- Hands-on experience with security monitoring tools (e.g., Splunk, Qradar, Trellix or similar) is advantageous.
Specific areas of expertise:
- Experience with Security Information Event Management (SIEM) platforms, such as:
- Splunk, IBM QRadar, Fortinet, Trellix, Microsoft Sentinel, etc.
- Experience with Endpoint Protection platforms, such as: EDR, XDR
- Document security incidents, alerts, and responses in ticketing systems.
- Produce timely and accurate reports on security events and trends.
- Provide regular updates to stakeholders on ongoing incidents.
- Knowledge and experience in modern threats, malware, network forensics, automation tools, and endpoint security technologies.
- Familiarity with security tools and technologies, including SIEM, firewalls, intrusion detection systems, endpoint protection, etc.
- Understanding of network protocols (TCP/IP, HTTP, DNS, etc.).
- Knowledge of common security vulnerabilities and attacks (e.g., DDoS, malware, SQL injection).
- Ability to work with operating systems (Windows, Linux, macOS) and basic command-line skills.
- Availability to work in shifts, as SOC operations often run 24/7.
- Ability to remain calm under pressure and manage multiple incidents simultaneously.
- Strong understanding of basic cybersecurity concepts and practices.
Certifications:
- One or more Cybersecurity certifications are preferred.
- Language Skills
- Azerbaijani (required)
- English (required)
İş haqqında məlumat
- Actively monitor and investigate security alerts to detect malicious activity at our clients during your shift in our 24x7x365 SOC.
- Perform MITRE ATT&CK analysis on incoming security alerts.
- Follow documented procedures to properly triage and respond to identified malicious activity, such as escalation or remediation actions.
- Continuously monitor security events and alerts from various security tools (SIEM, IDS/IPS, firewalls, endpoint protection).
- Identify and prioritize potential security incidents, including malware, phishing, data breaches, and system vulnerabilities.
- Escalate critical incidents to senior analysts (L2/L3) or incident response teams.
- Familiarity with the principals of network and endpoint security, current threats, vulnerabilities, and attack trends. Additionally, analysts should have a working knowledge of security principals and frameworks such as Cyber Kill Chain, MITRE ATT&CK, etc.
- SOC Analysts must be competent to work at a high technical level and be capable of identifying threats and attacking vectors.
Salary: To be determined at interview
Deadline: 09.01.2025
Interested candidates can send their CVs under the relevant headings.