Match score not available

Security Consultant - Operations

Remote: 
Full Remote
Contract: 
Salary: 
110 - 145K yearly
Experience: 
Mid-level (2-5 years)
Work from: 

Offer summary

Qualifications:

3-5 years in alert management with SIEMs, 3-5 years in alert tuning and threat detection, 3-5 years in cybersecurity principles and practices, Experience with modern SOC solutions and firewalls, Preferred certifications: CIAM, CISM, SANS.

Key responsabilities:

  • Support incident handling across multiple platforms
  • Provide analysis of escalated client requests
  • Perform investigations with SIEM and SOAR technologies
  • Guide clients through security program improvements
  • Produce timely communications and recommendations
Stratascale – An SHI Company logo
Stratascale – An SHI Company Information Technology & Services SME https://stratascale.com/
201 - 500 Employees
See more Stratascale – An SHI Company offers

Job description

Job Summary

The Security Consultant – Operations position will play a vital role in ensuring our client’s incidents are investigated, triaged, or action taken to remediate the incident. Their primary responsibility will be to support the alert management and incident handling process across multiple platforms and security technologies while providing in-depth analysis of alerts for our clients.

The Security Consultant will ensure timely investigation, actioning, and escalation of alerts using their expertise in incident handling, MDR, and SIEM technologies. They will guide clients through threat mitigation, perform threat-hunting activities, and review clients' defense strategies for process improvements. Additionally, they will contribute to policy development, stay up-to-date with cybersecurity threats and mitigation techniques, and maintain high cybersecurity standards. Adapting to evolving security landscapes is crucial to your success in this role.

This position is remote with a Home Office setup as determined by Stratascale management.

About Us

As a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.

To learn more about how we’re shaping the future of digital business and a more secure world, visit stratascale.com.

Responsibilities

Includes, but not limited to:

  • Support incident handling processes across multiple platforms and security technologies, including Windows, Linux and macOS.
  • Provide in-depth analysis of escalated requests originating from clients or their Managed Detection & Response (MDR) services.
  • Validate suspicious events by performing investigations using SIEM and SOAR technologies, leveraging threat intelligence and OSINT, TTPs and IOCs.
  • Identify gaps in client environments, data ingestions, or configuration errors which reduce quality of security alerts.
  • Work with clients and leadership to surface and resolve concerns around the security program.
  • Provide support to Security Analysts, including coaching and training as necessary.
  • Leverage your knowledge of Alert Triage, SOC Operations, and Depth in Defense strategies to contribute to projects for overall client success
  • Produce high-quality written and verbal communications, recommendations, and findings to client management in a timely manner
  • Address improvement opportunities within Stratascale for automation and process improvements.
  • Provide the client with a complete understanding of the investigations and suggest corrective actions to resolve alerts.
  • Participate in the development of cross-practice training or delegate training to team members on practice discipline capability, associated offerings, industry positioning and selling strategies.
  • Provide off-hours support for Alert Management – as assigned.

Qualifications

  • 3-5 years of experience in alert management across multiple SIEMs such as Splunk, Log Rythm, and Sentinel .
  • 3-5 years of experience in alert tuning, threat detection, and incident response
  • 3-5 years of experience with cyber security principles, concepts, and practices, including the ability to perform a complete and thorough incident investigation and triage with limited support.
  • 3-5 years of experience working with modern SOC solutions to include, but not limited to SIEM, EDR, Firewalls, Cloud Providers, Web Applications, etc.

Required Skills

  • Strong fundamental understanding of technical security solutions and how they address client risk exposure and solve key use cases.
  • Strong problem-solving capabilities with the ability to analyze complex data, identify patterns, and develop strategic solutions.
  • Demonstrate the ability to pivot to other log sources, cloud systems, or consoles to perform a comprehensive analysis from multiple data sources
  • Proactive and self-motivated mindset
  • Ability to work effectively and add value as a team member for the practice discipline.
  • Excellent verbal and written communication skills, with the ability to effectively explain technical concepts to non-technical individuals and communicate with clients.
  • Ability to train and disseminate information within an area or operation and work effectively within all levels of an organization, both internally and externally
  • Ability to engage and discuss technical and non-technical concepts with many client audience types, including C-Suite, VP/Director, Architect, Engineer, and Analyst resources.
  • Poses an ability to simplify and explain complex problems to stakeholders of all levels across multiple functions.
  • Entrepreneurial mindset with the ability to identify value in unstructured situations.
  • Emotional intelligence, flexible work style, and excellent diplomatic skills across all levels of the organization
  • Attention to detail, organization, and follow-up skills are critical.
  • Initiative to research and resolve problems with a positive attitude.
  • Excellent presentation skills and comfortable leading meetings and discussions
  • Ability to mentor and guide others.

Certifications Required

Certifications below are preferred but not required :

  • Industry certifications:
  • CIAM
  • CISM / CISA / CRISC
  • SANS (GSEC, GREM, GCIH)
  • TCM (PJMR)
  • Vendor Solutions and product specific certifications or experience (or equivalent):
  • Sumo Logic/Sentinel
  • Microsoft Defender/ CrowdStrike / Sentinel One
  • MDR/MSSP security engineering experience

Unique Requirements

  • Attend virtual customer meetings when appropriate
  • Travel to customer sites, partner sites, conferences and Stratascale offices up to 20% annually
  • Candidate will need to have access to an international airport

Additional Information

  • The estimated annual pay range for this position is $110,000 - $145,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
  • Equal Employment Opportunity – M/F/Disability/Protected Veteran Status

Compensation Structure

Base Plus Bonus

Approved Min (Total Target Comp)

USD $110,000.00/Yr.

Approved Max (Total Target Comp)

USD $145,000.00/Yr.

Required profile

Experience

Level of experience: Mid-level (2-5 years)
Industry :
Information Technology & Services
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Emotional Intelligence
  • Problem Solving
  • Analytical Skills
  • Teamwork
  • Detail Oriented
  • Mentorship
  • Verbal Communication Skills

Operations Consultant Related jobs