Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
We are seeking a skilled SOAR Administrator to join our cybersecurity team. You will be responsible for managing, monitoring, and optimizing security infrastructure, with a strong focus on SOAR platform administration and SIEM alert monitoring. This role is key in strengthening security operations, automating workflows, and ensuring timely threat detection and response.
Key Accountabilities
- Administer, configure, and maintain the SOAR platform to streamline and automate incident response workflows.
- Monitor, triage, and analyze SIEM alerts to identify potential threats and escalate incidents as required.
- Develop, test, and optimize playbooks to enhance automation efficiency and response accuracy.
- Collaborate with the SOC team to ensure effective integration of SOAR with SIEM and other security tools.
- Maintain documentation of processes, workflows, and response procedures.
- Conduct regular performance reviews of SOAR and SIEM systems to ensure reliability and scalability.
- Provide recommendations to improve detection, response, and overall security posture.
- Support incident response activities, ensuring quick and coordinated actions across stakeholders.
Qualifications:
- Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience).
- Proven experience in SOAR administration and SIEM monitoring/alert handling.
- Strong understanding of incident response processes, threat detection, and security operations.
- Hands-on experience with platforms such as Palo Alto Cortex XSOAR, IBM QRadar, Splunk, or equivalent.
- Knowledge of scripting languages (Python, PowerShell, etc.) to create/customize playbooks and integrations.
- Familiarity with industry standards (NIST, MITRE ATT&CK, ISO 27001, etc.).
- Excellent problem-solving, analytical, and communication skills.
Experience:
- Seeking a skilled SOAR Administrator with 5+ years of experience and proven exposure to an MSSP environment.
- Responsible for managing, monitoring, and optimizing security infrastructure.
- Expertise in SOAR platform administration (Cortex XSOAR, Splunk SOAR) and SIEM alert monitoring (QRadar, Splunk, Microsoft Sentinel).
- Hands-on experience in DDoS attack mitigation and Vulnerability Assessment (VA) scanning.
- Key role in strengthening security operations, automating workflows, and ensuring timely threat detection and response.
Skills:
- Certifications such as SOC Analyst, SOAR Specialist, SIEM Specialist, CISSP, or CEH.
- Experience with threat intelligence platforms and their integration into SIEM/SOAR.
- Exposure to cloud security monitoring (AWS, Azure, GCP).
Key Skills
Ranked by relevanceReady to apply?
Join edara and take your career to the next level!
Application takes less than 5 minutes