**What you'll do**
- Create and implement detection and prevention controls using a range of security tools (SIEM, DLP, IPS/IDS, EDR/Cloud)
- Management and implementation of network and security tools to support incident response
- Implement controls to identify new attack TTPs and mitigation techniques in support of daily operations
- Compile metrics and reports in support of SOC program objectives and priorities
- Develop and refine use-case scenarios for new and existing analytical tools
- Support SOC-specific activities for the day-to-day operations
- Enrich team value by sharing knowledge
**What experience you need**
- Bachelor's degree in Cyber Security, Computer Science, or a related field or equivalent work experience
- 5+ years of general Information Security experience required.
- 3+ years working as a Threat Detection Engineer professional is required.
- 3+ years working with one or more of the following tools (SIEM, EDR, DLP, SOAR, IPS/IDS, CSPM)
- 2+ years working as a cyber security analyst (SOC, CIRT, Cyber Intelligence)
- 2+ years of knowledge of tools used for network security (DLP, NIPS, HIPS, AV, Firewalls, etc.)
- English language proficiency B2 or above
**What could set you apart**
- Post-graduate degree
- Technical certifications (CISSP, CCNA, GCIA, GCIH, etc.)
- Ability to effectively manage multiple, concurrent activities, while understanding and managing priorities, dependencies, and risk
- Thorough understanding of network protocols
- Strong understanding of *nix and Windows operating system functionality
- Strong research, analytic, writing, and briefing skills.
- Demonstrated flexibility, initiative, judgment, and discretion.
- Willingness to learn new tools and processes and proven track record of learning new technologies, methodologies, and skills.
- Organizational, time management, customer service, and problem-solving skills, experience without a degree