This site uses cookies. By using our site, you agree to our Privacy and Cookie Policy

JUNIOR SOC SECURITY ANALYST

January 14, 2022
scroll
1 position

JUNIOR SOC SECURITY ANALYST

location

Any city, Ukraine

Svitla Systems Inc. is looking for a Junior SOC Security Analyst for a full-time position (40 hours per week) in Ukraine. Our client is the world's largest travel guidance platform, helping hundreds of millions of people each month become better travelers, from planning to booking to taking a trip. Travelers across the globe use the site and app to discover where to stay, what to do, and where to eat based on guidance from those who have been there before. With over 887 million reviews and opinions of nearly 8 million businesses, travelers turn to the client to find deals on accommodations, book experiences, reserve tables at delicious restaurants, and discover great places nearby as a travel guide company available in 43 markets and 22 languages. The client’s next-generation SOC features a dedicated team designed to detect advanced threats that evade traditional security solutions proactively. Threat hunting includes using manual and machine-assisted capabilities and aims to find advanced adversaries Tactics, Techniques, and Procedures (TTP). The candidate must have a curious, investigative mind, an interest in information security, and the ability to communicate complex ideas to varied audiences. The Threat Hunter will be a key member of the SOC team responsible for participating in threat actor-based investigations, internal red team activities, creating new detection methodology, and providing expert support to incident response and monitoring functions. The focus of the Threat Hunter will be to use data analysis, threat intelligence, open-source intelligence, and cutting-edge security technologies to develop and execute hunting processes (manual and automated) that will identify threats to the client and provide quick responses to real threats. The Security Operations Center (SOC) Security Analyst serves in a SOC team responsible for conducting information security investigations as a result of security incidents identified by the Level-1 security analysts. They monitor the security consoles from various SOC entry channels (SIEM, Tickets, Email, and Phone). You will provide analysis of Information Security Events received from Managed Security Service (MSS) Partners, Internal Tools, and Stakeholders; determine true or false positives, and execute appropriate response procedures. There are two analysts in the SOC team - one is from Svitla, and one is TL from the customer.

Requirements:

  • At least 2 years of experience at a Security Operations Center conducting security investigations.
  • Experience in security monitoring with one or more SIEM technologies: Splunk or Azure Sentinel.
  • Demonstrate skills in digital investigations, including computer forensics, network forensics, malware analysis, and memory analysis.
  • Strong understanding of security incident management, malware management, and vulnerability management processes (Tenable IO).
  • Knowledge of EDR ( Crowdstrike or alternatives).

Will be a plus:

  • Bachelor's Degree/diploma or equivalent practical experience with a relevant area of study with a preference for Information Security, Computer Science, or Computer Engineering.
  • Excellent written and verbal English skills. Preferred Information Security professional certifications include CISSP, CISM, CISA, GSEC, CEH.
  • Self-starter who could work independently and adjust to changing priorities, critical and strategic thinker, negotiator, and consensus builder.
  • Experience with Red Team or Blue team. 

Responsibilities:

  • Utilize intelligence to identify risks and execute best practices to mitigate or remediate those risks.
  • Develop tools and techniques to act as a red team member within the client’s organization.
  • Provide guidance and oversight on incident resolution and containment techniques.
  • Conduct information security investigations as a result of security incidents identified by the Level 1 security analyst who is monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email, and Phone), act as a point of escalation for Level-1 SOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques.
  • Coordinate individual security incidents from inception to completion.
  • Execute red team activities to identify risks not found by existing security tools.
  • Define, create and maintain SIEM correlation rules, customer build documents, security processes, and procedures. Follow ITIL practices regarding incident, problem, and change management.
  • Assist in automating manual processes to improve efficiency and accuracy of investigations.
  • Stay up-to-date with emerging security threats, including applicable regulatory security requirements.
  • Document incidents from initial detection through final resolution.
  • Participate in security incident management and vulnerability management processes.
  • Assist with internal threat/unintended threat hunting/deception activities.
  • Coordinate with IT teams on escalations, tracking, performance issues, and outages.
  • Works as part of a team to ensure that corporate data and technology platform components are safeguarded from known threats.
  • Communicate effectively with customers, teammates, and management.
  • Provide recommendations in tuning and optimization of security systems, SOC security processes, procedures, and policies.

We Offer:

  • Competitive compensation plan that takes skills and experience into consideration.
  • Annual performance appraisals.
  • Possibility to choose your workspace either remote or combination of your home and one of our development offices. 
  • Projects that use advanced, cutting-edge technologies.
  • Competitive bonuses for a personal recommendation of new employees.
  • Vacation time, sick-leaves, national holidays, family supplementary days off.
  • Comprehensive medical insurance including dental services, massages.
  • Support for a healthy lifestyle, compensation of sports events.
  • Maternity leave policy.
  • A personal loan budget is available for long-term personnel.
  • Partial compensation of conferences, courses, and English classes.
  • Free meetups, webinars, and conferences organized by Svitla.
  • Birthday and New Year presents for personnel, gifts for children.
  • Fun summer and winter corporate parties and memorable anniversary presents.

About Svitla:

Svitla Systems is a global trusted IT solutions company headquartered in California, with business and development offices throughout the US, Latin America, Europe, and Asia.

Svitla is an outspoken advocate of workplace flexibility, an individual approach to our teammates’ professional and personal growth, and a family-like environment.

Since 2003 we have served a wide range of customers, from innovative start-ups in California to large corporations like  Ingenico, AstraZeneca, and Ancestry. At Svitla, developers work with clients directly, building lasting and successful partnerships.

Our global mission is to build a business that contributes to the well-being of other communities and makes a lasting difference in the world. Join us!

If you are interested in our vacancy, please send your CV. We will be happy to see you in our friendly team :)

Why hesitate? Apply now

Send your resume

Thank you for applying for this job position

Your application is received. We will contact you shortly if your resume is a perfect fit for our company.