SOC Cyber Threat Snr. Specialist at Vodafone United States
Ankara, Ankara, Turkey -
Full Time


Start Date

Immediate

Expiry Date

27 Feb, 26

Salary

0.0

Posted On

29 Nov, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cyber Threat Intelligence, Vulnerability Management, Incident Response, Security Operations, Analytical Skills, Project Management, Penetration Testing, Red Teaming, SIEM, SOAR, Forensic Analysis, Threat Intelligence, Malware Behavior, Network Security, Security Standards, Exploitation Techniques

Industry

Telecommunications

Description
Collecting security threat and exposure information by Cyber Threat Intelligent (CTI) services, Vulnerability Management Services Evaluate credibility, validity and relevance of collected data/information/intelligence Consume and analysis CTI such as indicators of compromise, tactics, techniques and procedures Management of daily Information Security operations and maintenance of Security Products (SIEM , SOAR , Incident Response ,Vulnerability Management and other Information Security Products), Analytical and investigative abilities with hands-on experience on cyber security incident response and response automation strategies, and ability to work to tight guidelines and under high pressure in the context of cyber incidents, Examining alarms escalated by Level-1, analyzing attack vectors, Performing vulnerability scanning, analysis and reporting at regular intervals and when requested, with the customer's continuous vulnerability scanning and analysis solutions, Creating event investigation steps for alarms Preparing weekly reports, Escalating the necessary alarms to Level-3 personnel in accordance with the processes Following up/reporting patches and updates, to ensure that the necessary documents for SOC are prepared and kept up to date Project Management Document, Specification, Contract, etc. of the customer to whom service is provided. To have full knowledge of all the documents related to the project and to carry out the project activities within the framework of these documents Making assessments on Information Security processes and taking responsability of implementing improvements on related systems, Following latest cyber threats and security trends and taking proper actions to mitigate the related Information security risks, Bachelor's Degree in engineering departments (preferably Electronics or Computer Engineering), 3+ years of experience in performing hands-on security engineering, consulting, team management, penetration testing, and/or adversary simulation, red teaming exercises, vulnerability assessments in complex operational ICT environments, Familiarity with industry standards like OWASP TOP10, CVSS, CIS, NIST etc. Excellent understanding of attacker tools, tactics and techniques and referencing on MITRE ATT&CK, CISSP, CISM, OSCP, CEH or equivalent would be a plus, Experience developing detection logic for enterprise SIEM systems and with exploitation techniques and use case development, Experience in the detection and response to malicious activity using log data and alerts from cybersecurity solutions, systems, and cyber threat intelligence sources Experience extracting and analizing forensic artifacts across Windows, Mac, and Linux operating systems, Experience supporting an Incident Response Program through the development of procedural documentation, Experienced in SIEM products and SOAR products in Use Case and Playbook Development perspective Experience working in an industry standard Security Operations Center or similar environment providing incident handling and response, intrusion detection, analysis, cyber threat intelligence, threat determination, and mitigations processing and tracking, working with several network and system security technologies to include Elasticsearch, data analytics platforms, endpoint tools, network technologies, and SIEMs Experience of incident response processes, and threat intelligence cycles, including understanding of IP network traffic, security vulnerabilities, different exploitation techniques, and malware behaviors (including communications protocols), Experience in Penetration testing and red teaming activies is a plus. Not a perfect fit? Worried that you don't meet all the desired criteria exactly? If you're excited about this role but your experience doesn't align exactly with every part of the job description, we encourage you to still apply as you may be the right candidate for this role or another opportunity.

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities
The role involves collecting and analyzing security threat information, managing daily information security operations, and responding to cyber incidents. The specialist will also create reports, escalate alarms, and implement improvements in information security processes.
Loading...