We are a leading trading platform that is ambitiously expanding to the four corners of the globe. Our top-rated products have won prestigious industry awards for their cutting-edge technology and seamless client experience. We deliver only the best, so we are always in search of the best people to join our ever-growing talent team. A Security Operations Center (SOC) Analyst will be responsible for monitoring an organization's information systems and networks to detect and respond to security incidents.
Responsibilities:
- Monitoring: Continuously monitor network traffic, security alerts, and events to identify potential security incidents.
- Incident Detection: Detect and analyze security threats, anomalies, and potential breaches to assess their impact and severity.
- Incident Response: Respond to security incidents by following established procedures, containing threats, and mitigating potential damage.
- Log Analysis: Analyze log data and security event information to identify trends and patterns that may indicate security issues.
- Threat Intelligence: Stay updated on the latest cybersecurity threats, vulnerabilities, and attack techniques to improve threat detection.
- Alert Triage: Prioritize security alerts and incidents based on their severity and potential impact on the organization.
- Security Tools: Utilize a variety of security tools, including SIEM (Security Information and Event Management) systems, intrusion detection systems (IDS), and other monitoring and detection solutions.
- Reporting: Prepare and maintain detailed incident reports and provide post-incident analysis to improve security measures.
- Security Policies: Ensure that security policies and procedures are followed and assist in the development and refinement of security policies.
- Collaboration: Work closely with other teams, such as IT and network administrators, to address security issues and implement solutions.
- Threat Hunting: Proactively search for signs of advanced threats and vulnerabilities within the network.
Requirements:
- Security Fundamentals: A strong understanding of cybersecurity principles, including knowledge of common threats and vulnerabilities.
- SIEM and Security Tools: Proficiency in using SIEM tools and familiarity with various security solutions like IDS/IPS, antivirus, and firewalls.
- Networking: Knowledge of network protocols, architectures, and security measures to analyze network traffic and detect anomalies.
- Log Analysis: Skill in analyzing log data and identifying security events and incidents.
- Incident Response: Familiarity with incident response procedures and the ability to act swiftly and effectively in the event of a security breach.
- Threat Intelligence: An understanding of the current threat landscape and the ability to apply threat intelligence to incident detection and response.
- Critical Thinking: Strong analytical and problem-solving skills to assess security incidents and make informed decisions.
- Communication: Effective communication skills to report incidents and interact with colleagues and superiors.
- Teamwork: The ability to work collaboratively with cross-functional teams in a fast-paced and high-pressure environment.
- Continuous Learning: A commitment to staying updated on emerging threats and security technologies.
What you will get in return:
- You will join the Company, that cares about work and life balance
- Hybrid type of work (3 days per week in the office)
- Annual bonus depending on personal performance
- Family Medical Insurance, Pension fund, and Multisport card for CoE
- Full annual performance assessment
- Modern and outstanding equipment
- Employee referral program
- The opportunity to work with one of the smartest teams on the market.
Be a key player at the forefront of the digital assets movement, propelling your career to new heights!Join a dynamic and rapidly expanding company that values and rewards talent, initiative, and creativity. Work alongside one of the most brilliant teams in the industry.