-
3 years of experience working in a SOC environment or computer security team in an IT environment
-
2 years of experience mapping, analyzing, or documenting technical workflows in a SOC, security engineering, or IT operations environment to support process automation or tooling development.
-
Strong analytical skills with the ability to translate complex workflows into clearly defined processes.
-
Experience in researching and documenting security operations, incident response, or similar technical processes.
-
Strong troubleshooting, debugging, and analytical skills, with proven ability to think outside the box.
-
Ability to convert documented requirements into actionable coding tasks in both independent and collaborative environments.
-
Solid understanding of cybersecurity operations principles and best practices.
-
Customer service-oriented with strong written and verbal communication skills
-
Must thrive within a team environment as well as on an individual basis
-
Natural curiosity and ability to learn new skills quickly
-
Innovative mindset and driven to contribute to a team providing a best-in-class cybersecurity service
-
Familiarity with Security Orchestration, Automation, and Response (SOAR) concepts or platforms is preferred.
-
Detail-oriented, with a proven passion for continuous improvement in cybersecurity practices.
-
A Plus if You Have
-
Familiarity with threat intelligence platforms, frameworks (e.g., MITRE ATT\&CK), and common TTPs (Tactics, Techniques, and Procedures).
-
Experience with data analytics or business intelligence tools (e.g., Splunk, Power BI, Tableau) to visualize and measure workflow efficacy.
-
Background in project management or business analysis to help coordinate cross-functional initiatives.
-
Understanding of machine learning or data science concepts that can be applied to anomaly detection and threat hunting.
-
Previous experience in a SOC environment, threat hunting, or incident response.