SOC Team Lead - Geneve, Schweiz - BlueVoyant

BlueVoyant
BlueVoyant
Geprüftes Unternehmen
Geneve, Schweiz

vor 2 Wochen

Lena Schneider

Geschrieben von:

Lena Schneider

beBee Recruiter


Beschreibung

SOC Team Lead

Location:
Geneva, Switzerland


Schedule:
Rotation shift pattern that uses 5 teams and 8-hr shifts to provide 24/7 coverage. The pattern worked consists of 2 early shifts, 2 late shifts, 2 night shifts and 4 days off. Including breaks, shifts last more 8 hours, creating some overlap between the 5 teams. The complete cycle for a shift team is 10 days.


Summary
BlueVoyant is looking for Security Operations Center (SOC) Team Lead to help our global customers manage their IT security.

You will be part of a fast-paced team that helps customers to reduce the impact of security incidents and ensures that critical business operations continue unhindered.


This position is located in Europe.

Key Responsibilities

  • Provides supervision and oversight for Security Analysts during a standard working team/shift
  • Assumes full responsibility and accountability for ensuring that customers receive worldclass service from Security Analysts assigned to their shift
  • Assigns Security Analysts to information security events and oversees investigations as necessary
  • Assumes responsibility for issues and requests escalated by Security Analysts and executes additional escalations as necessary
  • Supervise operations in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions.
  • Supervises complex event investigation and incident declaration
  • Ensure events are properly identified, analyzed, and escalated to incidents.
  • Hunt for suspicious activity based on anomalous activity and indicators of compromise from various intelligence feeds and toolsets.
  • Participate in the response, investigation, and resolution of security incidents.
  • Create knowledge base articles for handling medium and high severity incidents.
  • Assist in the advancement of security policies, procedures, and automation.
  • Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and hostbased intrusion detection systems, firewall logs, and system logs (Windows and Unix), and databases
  • Separate true threats from false positives using network and log analysis and escalate possible intrusions and attacks
  • Provide incident investigation, handling, and response to include incident documentation.
  • Initiate tickets, document, and escalate to higherlevel security analysts
  • Develop incident response reporting and policy updates as needed.
  • Perform computer and network forensic analysis.
  • Serve as the technical escalation point and mentor for lowerlevel analysts
  • Regularly communicate with customer IT teams to inform them of issues, help them remediate, and ensure that they continue to operate business as usual
  • Perform triage of incoming issues (assess the priority, determine risk).
  • Work with customers to deploy hardware and software monitoring systems
  • Maintain a strong awareness of the current threat landscape.

Basic Qualifications

  • Excellent teamwork skills
  • Knowledge of and experience with intrusion detection/prevention systems and SIEM software
  • Advanced knowledge and understanding of network protocols and devices.
  • Advanced experience with Mac OS, Windows, and Unix systems.
  • Ability to analyze event logs and recognize signs of cyber intrusions/attacks
  • Ability to handle high pressure situations in a productive and professional manner.
  • Ability to work directly with customers to understand requirements for and feedback on security services
  • Advanced written and verbal communication skills and the ability to present complex technical topics in clear and easytounderstand language
  • Strong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed team
  • Able and willing to work in a 24/7/365 environment, including nights and weekends, on a rotating shift schedule
  • Ability to provide create signatures for security tools
  • Familiarity with tools such as Wireshark, TCP Dump, Security Onion, and Splunk
  • Strong knowledge of the following:
  • SIEM
  • Packet Analysis
  • SSL Decryption
  • Malware Detection
  • HIDS/NIDS
  • Network Monitoring Tools
  • Case Management System
  • Knowledge Base
  • Web Security Gateway
  • Data Loss Prevention
  • Anti-Virus
  • Network Access Control
  • Encryption
  • Vulnerability Identification

Preferred Qualifications

  • Experience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas
  • 5+ years of handson SOC/TOC/NOC experience
  • GCIA and/or GCIH required. GCFA, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred
  • Familiarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and Nessus
  • Familiarity with GPO, Landesk, or other IT Infrastructure tools
  • Understanding and/or experience with one or more of the following programming languages:NET, PHP, Perl, Python, Java, Ruby, C, C++

Mehr Jobs von BlueVoyant