SOC Analyst L3 / SOC Team Lead

icon Pakistan, Islamabad, Karachi, Lahore


Job Description

You will play a crucial role in expanding the scope and capabilities of our SOC Managed Services as the Security Operations team lead - Level 3 support and function as a key customer’s team contact while providing an exceptional experience.

Reporting to the Director Of Cyber Security , you will be a key contributor to the ongoing success and continuous development of the wider security and support services team. Show off your proven leadership skills by offering your advice to resolution and by providing a route to resolution based on a firm understanding of operational workflows. All to fulfill our mission of providing an unmatched, white-glove customer experience, best-in-class security outcomes, and precise technical support for a wide variety of products, technologies, and applications to ensure the protection our customers’ asset

Responsibilities:

  • Provide World Class Customer Experience and security outcomes for our customers.
  • Ensure Customer Service Level Agreements are adhered to and all open requests and incidents are resolved in a timely manner whilst meeting expected quality standards.
  • Provide security expertise, through appropriate tasking, for customers during incident responses including Incident remediation and prevention documentation.
  • Manage staffing shift and team staffing levels to ensure adequate coverage during scheduled operational delivery.
  • Identify and drive improvement opportunities relating to customer experience, security value, and internal operational efficiencies.
  • Effectively communicate information relating to Customers and operational delivery between shift teams.
  • Take ownership of cases escalated by SIEM Analysts (Tier II)
  • Initiate the correct procedures to counteract potential threats/vulnerabilities.
  • Assist with the development of processes and procedures to improve customer experience, incident response times, analysis of incidents, and overall Security & Support functions.
  • Assist the manager of Security Operations Center Services in ensuring that Quality Assurance policies and standards are being adhered to for key processes and Customer interaction.
  • Identify coaching and development opportunities for Security and Support Analysts through a variety of methods – from one-to-one coaching to working closely with our Training team to provide bespoke training classes / certifications to fit the needs of the team.
  • Day-to-day management of assigned team members including bi-weekly one-on-one reviews, attendance management, and career-pathing.
  • Produce daily, weekly, monthly operational metrics.

Qualifications

  • 8-10 + years of progressive experience in a security consultant, security operations, security engineering role
  • At least 2-3 years of experience leading a team
  • Strong belief in ownership, from identification, through resolution and validation of Operational issues
  • A team player who is willing to participate in the day-to-day activities
  • A clear and confident communicator

Required Skills

  • At least 5+ years of experience in a SOC Analyst role at a SOC/MXDR or MSSP with L2 experience
  • Strong understanding of networking technologies
  • Experience with Microsoft and other leading SIEM tools & technologies such as Microsoft Sentinel and M365 Defender, Defender for Identity, Defender for Cloud and Defender for IoT, QRadar, Splunk etc
  • Strong understanding of security best practices and incident response procedures
  • Experience with deep threat intelligence
  • Strong proficiency with KQL Queries and automation
  • Strong verbal and written communication skills
  • Strong analytical and problem-solving skills
  • Must have Azure security working experience
  • Experience with scripting languages such as Python, PowerShell, and JavaScript
  • Familiarity with incident response requirements based on NIST guidelines
  • Willingness to work in a 24/7 environment
  • Experience with techniques utilizing the MITRE ATT&CK framework for incident investigation and threat hunting
  • Experience in conducting investigations and identifying malicious activities using techniques such as packet analysis, log analysis, and endpoint forensics

Job Timings: 8:00 P.M to 05:00 A.M(PK Time)

Required Skills

IBM QRadar,PowerShell,Azure Sentinel
Apply this job
Job has been deactivated.


Industry

Information Technology

CATEGORY

Software & Web Development

JOB TYPE

Full Time/Permanent

Minimum Education

Bachelors

Career Level

Experienced Professional

Required Experience

8 Years - 10 Years

Total Positions

1