We are a leading trading platform that is ambitiously expanding to the four corners of the globe. Our top-rated products have won prestigious industry awards for their cutting-edge technology and seamless client experience. We deliver only the best, so we are always in search of the best people to join our ever-growing talent team.
We are seeking an ambitious and goal-oriented Security Operations Center (SOC) Analyst to join our growing Security Team. The person will be responsible for monitoring Capital's information systems and networks to detect and respond to security incidents.
Responsibilities: Monitoring: Continuously monitor network traffic, security alerts, and events to identify potential security incidents Incident Detection: Detect and analyze security threats, anomalies, and potential breaches to assess their impact and severity Incident Response: Respond to security incidents by following established procedures, containing threats, and mitigating potential damage Log Analysis: Analyze log data and security event information to identify trends and patterns that may indicate security issues Threat Intelligence: Stay updated on the latest cybersecurity threats, vulnerabilities, and attack techniques to improve threat detection Alert Triage: Prioritize security alerts and incidents based on their severity and potential impact on the organization Security Tools: Utilize a variety of security tools, including SIEM (Security Information and Event Management) systems, intrusion detection systems (IDS), and other monitoring and detection solutions Reporting: Prepare and maintain detailed incident reports and provide post-incident analysis to improve security measures Security Policies: Ensure that security policies and procedures are followed and assist in the development and refinement of security policies Collaboration: Work closely with other teams, such as IT and network administrators, to address security issues and implement solutions Threat Hunting: Proactively search for signs of advanced threats and vulnerabilities within the network Requirements: Security Fundamentals: A strong understanding of cybersecurity principles, including knowledge of common threats and vulnerabilities SIEM and Security Tools: Proficiency in using SIEM tools and familiarity with various security solutions like IDS/IPS, antivirus, and firewalls Networking: Knowledge of network protocols, architectures, and security measures to analyze network traffic and detect anomalies Log Analysis: Skill in analyzing log data and identifying security events and incidents Incident Response: Familiarity with incident response procedures and the ability to act swiftly and effectively in the event of a security breach Threat Intelligence: An understanding of the current threat landscape and the ability to apply threat intelligence to incident detection and response Critical Thinking: Strong analytical and problem-solving skills to assess security incidents and make informed decisions Communication: Effective communication skills to report incidents and interact with colleagues and superiors Teamwork: The ability to work collaboratively with cross-functional teams in a fast-paced and high-pressure environment Continuous Learning: A commitment to staying updated on emerging threats and security technologies What you get in return: You will join a company that cares about work and life balance Annual Bonus based on the performance review cycle Generous Annual Leave Policy Medical Insurance and Pension fund, with additional benefit packages based on the location Hybrid working model with full flexibility Possibility of taking two additional days of paid leave per year to dedicate to volunteering efforts.
#J-18808-Ljbffr