Match score not available

Security Operations Analyst

Remote: 
Full Remote
Experience: 
Mid-level (2-5 years)
Work from: 

Offer summary

Qualifications:

Minimum of 2 years cybersecurity experience, Proven incident response skills, Familiarity with security tools and regulations, Strong knowledge of cloud security.

Key responsabilities:

  • Monitor and respond to incidents
  • Operate incident response efforts
Swirlds Labs logo
Swirlds Labs Information Technology & Services Scaleup https://swirldslabs.com/
51 - 200 Employees
See more Swirlds Labs offers

Job description

About Hashgraph:

Hashgraph is a fast-growing software company committed to supporting, developing and servicing Hedera, an open source, proof-of-stake platform. Hedera is EVM-compatible and has been specifically built to meet the needs of enterprise and Web3 applications, which require speed, security, stability and sustainability. Hedera’s public network is governed by industry-leading organizations, spanning 11 sectors and 14 regions who oversee the development and direction of the decentralized platform.

About the role:

The SecOps Analyst is responsible for enabling the security operations of an organization, with the primary goal of protecting its information assets and infrastructure. They will work with a team of security professionals and support the Security Operations Center (SOC) to monitor, detect, and remediate security threats and vulnerabilities. The SecOps Analyst plays a crucial role in incident response coordinating efforts to address incidents. They also collaborate with various stakeholders, evaluate and implement security technologies, and ensure compliance with industry regulations and best practices.

You may find yourself doing all of the following:

  • Monitoring for and responding to potential incidents
  • Operating the organization's incident response efforts, including developing, maintaining, and executing incident response plans
  • Assisting our Threat Detect team to build more advanced/robust detections
  • Assisting in tuning and enhancing existing detections
  • Evaluating and implementing security technologies and tools to enhance the organization's security posture
  • Collaborating with stakeholders to address security concerns and ensure compliance
  • Conducting regular security audits and risk assessments to identify potential vulnerabilities and develop mitigation strategies
  • Developing and maintaining relationships with external security partners
  • Staying current with the latest security trends, threat intelligence, and best practices
  • Providing regular reports and updates on the organization's security status to management and other relevant stakeholders

Qualification Requirements:

  • A minimum of 2 years of experience in cybersecurity or SOC
  • Proven experience in incident response, including developing and executing incident response plans, conducting investigations, and coordinating with internal and external stakeholders
  • Familiarity with cloud security, network security, application security, and endpoint security
  • Experience with security tools and platforms, such as SIEM, vulnerability scanners, endpoint protection platforms, and threat intelligence solutions
  • Familiarity with regulatory standards and frameworks, such as GDPR, NIST, SOC 2, and ISO 27001
  • Experience in conducting security audits, risk assessments, and developing remediation plans
  • Excellent analytical, problem-solving, and decision-making skills
  • Knowledge of and experience with cloud security, including securing Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) environments, as well as familiarity with cloud service providers, such as AWS, Azure, and Google Cloud Platform
  • Proven track record of successfully implementing and maintaining security technologies and processes in complex environments
  • Strong communication and interpersonal skills, with the ability to effectively communicate complex security concepts to both technical and non-technical stakeholders
  • Demonstrated leadership and team management abilities, including mentoring and coaching team members
  • A strong commitment to staying current with industry trends, emerging threats, and best cybersecurity practices

Other skills that are great to bring with you but that we can help you develop:

  • Understanding of common programming languages and scripting languages, such as Python, PowerShell, or Bash
  • Experience with containerization and orchestration technologies, such as Docker and Kubernetes, and their associated security best practices
  • Knowledge about Blockchain / Crypto / Web3

Required profile

Experience

Level of experience: Mid-level (2-5 years)
Industry :
Information Technology & Services
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Problem Solving
  • Decision Making
  • Communication
  • Analytical Skills
  • Leadership
  • Team Management
  • Social Skills

Security Operations Center (SOC) Analyst Related jobs