Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- Monitor and analyse the organization's networks and systems on a daily basis to detect, identify, investigate, and mitigate potential threats.
- Identify anomalous behavior, recognize patterns of malicious activity, and take appropriate corrective action
- Follow detailed operational process and procedures to appropriately analyse, escalate, and assist in remediation of critical information security incidents.
- Correlate and analyse events using the Splunk/Log Rhythm SIEM tool to detect IT security incidents.
- Conduct analysis of log files, including forensic analysis of system resource access.
- Monitor multiple security technologies, such as SIEM, IDS/IPS, EDR, Firewalls, Switches, VPNs, and other security threat data sources.
- Respond to inbound requests via phone and other electronic means for technical assistance with managed services.
- Respond in a timely manner (within documented SLA) to support, threat, and other cases.
- Document actions in cases to effectively communicate information internally and to customers.
- Resolve problems independently and understand escalation procedure.
- Maintain a high degree of awareness of the current threat landscape.
- Perform other essential duties as assigned.
- Able to work in rotating shifts within a 24/7 operating environment.
- 3-5 years of experience in Security Operations, Incident response and monitoring , threat hunting etc.
- A Degree in Computer Science, Information Systems or equivalent.
- CCNA, CompTIA CySA+, CISSP, GCA, GCIA, GCIH, CEH, SIEM-specific certifications would be preferable.
- An active interest in internet security, incident detection, network and systems security.
- A sound knowledge of IT security best practices, common attack types and detection/prevention methods.
- Demonstrable experience of analysing and interpreting system, security, and application logs.
- Knowledge of the type of events that both Firewalls, IDS/IPS, and other security related devices produce.
- Experience in using SIEM tools such as Splunk & Log Rhythm.
- TCP/IP knowledge, networking, and security product experience.
- Knowledge of Cyber Kill Chain and MITRE ATT&CK frameworks.
- Possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, etc. and possible abnormal activities, such as worms, Trojans, viruses, etc.
- Ability to analyse data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents
- Strong analytical and problem-solving skills.
- Very good communication skills.
- Strong interpersonal skills with the ability to collaborate well with others.
Key Skills
Ranked by relevanceReady to apply?
Join Dicetek LLC and take your career to the next level!
Application takes less than 5 minutes