Job Details
Job Description
Responsibilities:
Monitoring & Analysis: Monitor SIEM platforms (e.g., Trellix, Splunk, Microsoft Sentinel) and analyze logs from firewalls, IDS/IPS, and endpoint security to detect and investigate suspicious activity.
Incident Response: Assist in the investigation and response to security alerts, including containment, eradication, and recovery of security incidents.
Threat Mitigation: Work with senior engineers to analyze and mitigate threats like malware infections, phishing attacks, and unauthorized access attempts.
Security Posture: Assist in managing firewall rules, endpoint security policies, and vulnerability remediation to enhance overall security posture.
Customer Support: Provide security troubleshooting support and assist in implementing security configurations for both internal and external customers.
Documentation: Help document security events, incident reports, and standard operating procedures (SOPs).
Minimum Requirements:
2-3 years of experience in IT security, SOC operations, or IT support with a security focus.
A strong understanding of cybersecurity fundamentals, including network security, endpoint protection, and incident response.
Familiarity with SIEM solutions, log analysis, and security monitoring tools.
Basic knowledge of firewalls, IDS/IPS, antivirus solutions, and cloud security (Azure, AWS, Microsoft Defender, etc.).
Strong troubleshooting, analytical, and communication skills.
Recommended Certifications
CompTIA Security+
Microsoft Certified: Security, Compliance, and Identity Fundamentals
Certified SOC Analyst (CSA) – EC-Council
Fortinet NSE 1, 2 & 3
Cisco CyberOps Associate
Benefits:
- Competitive salary based on experience (salary can potentially be more based on experience/skills)
IF you meet the above requirements and want to make a career-changing move, apply today by emailing your CV to [email protected]