A SOC (Security Operations Center) Detection Engineer is a critical member of the cybersecurity team, responsible for designing, implementing, and maintaining systems and methodologies for detecting and responding to cyber threats. This professional plays a central role in identifying vulnerabilities, monitoring network activities, and ensuring the organizations digital assets are safeguarded against malicious actors.
Key Responsibilities
Threat Detection and Analysis
Develop and maintain log collection, analysis, and monitoring systems to identify suspicious activities.
Analyze network traffic, endpoint data, and system logs to detect anomalies and indicators of compromise (IoCs).
Identify emerging threats and vulnerabilities by staying updated with the latest intelligence and threat trends.
Incident Response
Collaborate with SOC analysts to investigate and respond to security incidents.
Provide technical expertise in triaging and resolving incidents while minimizing impact on operations.
Design and document incident response procedures for rapid and effective action.
Automation and Tool Development
Develop scripts and tools to automate repetitive detection tasks and enhance operational efficiency.
Integrate detection and monitoring tools seamlessly into the companys IT infrastructure.
Test and fine-tune monitoring tools to optimize accuracy and performance.
Collaboration and Communication
Work closely with the IT, network, and development teams to ensure security best practices are implemented.
Communicate findings and recommendations effectively to stakeholders, including non-technical audiences.
Contribute to the creation of educational materials and workshops to train staff on cybersecurity awareness.
Required Skills and Qualifications
Technical Expertise
Proficiency in Microsoft tools and platforms, such as Microsoft Sentinel (formerly Azure Sentinel) for SIEM operations, Defender for Endpoint, and Microsoft Cloud App Security.
Strong understanding of Microsoft networking protocols, Active Directory, Azure environments, and firewall configurations using Microsoft solutions.
Experience with scripting in PowerShell for automation, debugging, and enhancing Microsoft tool functionality.
Analytical and Problem-Solving Skills
Ability to analyze complex datasets from Microsoft tools and extract actionable intelligence.
Strong troubleshooting skills to identify root causes of potential threats within Microsoft environments.
Proven ability to think critically under pressure and make sound decisions during incidents.
Educational Background
Bachelor s degree in Computer Science, Cybersecurity, Information Technology, or a related field.
Relevant certifications such as Microsoft Certified: Security Operations Analyst Associate, CompTIA Security+, CEH (Certified Ethical Hacker), CISSP, or GIAC preferred.
Experience
Minimum of 2-3 years of experience in cybersecurity, SOC operations, or a similar role, preferably with expertise in Microsoft security tools.
Hands-on experience with threat intelligence platforms and detection methodologies using Microsoft Azure and Defender products.
Proven track record of minimizing threats and vulnerabilities in previous positions.
Key Attributes
Attention to Detail: Ensure accuracy in identifying and documenting threats and incidents.
Adaptability: Respond effectively to the dynamic and evolving landscape of cybersecurity threats.
Team Collaboration: Work seamlessly with other cybersecurity professionals and business units.
Continuous Learning: Eager to stay informed about the latest tools, technologies, and threat intelligence.
Work Location: Mumbai/Bangalore (remote) Joining time needed : 30 days