Senior Security Operations Engineer

2 - 4 years

5 - 8 Lacs

Posted:1 week ago| Platform: GlassDoor logo

Apply

Work Mode

On-site

Job Type

Part Time

Job Description

Come work at a place where innovation and teamwork come together to support the most exciting missions in the world!
Job Overview:
As a Senior Security Operations Engineer, you will be an integral part of Qualys SOC (Security Operation Center) and CSIRT (Cyber Security Incident Response Team) contributing to the day-to-day activities aimed at governing entire incident management lifecycle from incident monitoring, triaging, analyzing, and responding to security incidents. This role requires a solid understanding of security technologies, incident triage/investigation & incident response, and a proactive approach to identifying and mitigating potential threats. You will leverage advanced cybersecurity tools and techniques to monitor and secure Qualys infrastructure/systems, Qualys Cloud Platforms, respond to alerts, investigate potential threats, and proactively work for mitigation of identified cyber threats/incidents. At the same time, you will be responsible for providing expert guidance to other SOC engineers in the team and working closely with SOC/CSIRT leadership to improve the organization’s security posture.

Key Responsibilities:
Security Monitoring and Analysis:
  • Proactively monitor security systems, SIEM platforms, various security tools, analyze logs, network traffic, system events and incident alerts for signs of malicious activity or policy violation.
  • Conduct incident triage, build incident investigation hypothesis, incident response approach.
  • Investigate and respond to alerts, ensuring a timely and effective resolution.
  • Review the triggered incident and analyze the incident tickets created by SOC level 1 engineers for correct incident classification, categorization, setting up security permission, false positive validation and finetuning etc.
  • Must be familiar with various log sources and investigation approach depending on various kinds of incidents. Should understand the correlation between log sources as needed for investigation.
  • Analyze network and host activities associated with both successful and unsuccessful intrusions by threat actor's basis perimeter security logs.
  • Should have experience in correlating malware infections with attack vectors to determine the extent of security and data compromise.
  • Monitor SIEM and other security tools alerts for anomalous or suspicious activity; research alerts and make recommendations to remediate concerns.
  • Analyze, correlate and action on data from subscription and public cyber intelligence services, develop tactics to combat future threats, and follow the Incident Response Plan for required response.
  • The ability to perform analysis of log files from multiple different devices and environments and identify indicators of security threats.
  • You will be responsible for assisting all junior SOC engineers related to incident monitoring, investigation and response.
Incident Response:
  • Participate in incident response activities, assisting in the identification, containment, eradication, and recovery from security incidents.
  • Run incident response calls with help of CSIRT lead/manager via incident warroom and bridge call to other incident resolution teams.
  • Document incident response activities along with entire incident timelines and contribute to post-incident reports.
Threat Detection & Analysis:
  • Analyze logs, security events, and network traffic for anomalies and indicators of compromise (IOCs).
  • Perform forensic analysis on potentially compromised systems using in-house digital forensic lab.
  • Conduct sandbox analysis and obtain report for various malicious code/payloads identified in case of infected systems.
Security Tool Management:
  • Configure and manage security tools such as Endpoint Detection and Response (EDR), Endpoint Protection Platforms (EPP), File Integrity Monitoring (FIM), Application Control (Whitelisting/Blacklisting) on endpoints etc.
  • Identify different attack patterns (IOA - Indicator of Attacks) in security logs which can cause harm to our system. Work with SIEM detection team to convert these patterns into an automated detection logic on SIEM platform.
Threat Intelligence Support:
  • Configure and manage the open source and in-house threat intelligence sharing platform.
  • Assist in the integration of threat intelligence into security operations processes to enhance detection capabilities.
  • Stay informed about the latest cybersecurity threats and vulnerabilities via various cyber security newsletters and security advisories. Notify SOC team about actionable for identified advisories.
Threat Hunting:
  • Conduct proactive threat-hunting activities to identify emerging threats and weaknesses in the organization’s security defenses.
  • Follow organization threat hunting procedure to carry out our various threat hunting activities and work on remediation of identified misconfigurations/security issues during hunt.
Incident Response Documentation & SOAR Runbook Creation:
  • Work with CSIRT lead/manager to build incident response runbooks for remediation of various cyber-attack scenarios.
  • Identify unknown attack patterns by analyzing various log sources and work with SIEM administration team to convert them into automated use cases.
  • Translate conceptual SOC/IR requirements into technical data and integration requirement for SOAR platform.
  • Work with SIEM/SOAR admin team to convert the technical data into SOAR playbooks.
  • Enhance existing incident response runbooks and work on fine tuning of existing use cases on SIEM platform.
Experience:
  • 2-4 years of working experience in a Security Operations Center (SOC) or Incident Response role.

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now
Qualys logo
Qualys

Computer and Network Security

Foster City CA

RecommendedJobs for You