We consider our team to be our greatest asset, and that’s why we create an environment and opportunities for its members that always drive us forward. See open positions.
Job Description
Utilizing information system protection tools for continuous monitoring and analysis of system activities to identify malicious activities;
Analyzing network traffic to identify unwanted and potentially dangerous content for network resources;
Providing timely detection, identification, and notification of potential cyber-attacks, anomalies, and system abuse activities;
Documenting and escalating incidents that could harm the defined environment;
Generating daily reports on monitored network events and activities relevant to information system protection.
Desirable Skills and Experience
Possession of IT-related certifications, preferably in the field of IT security (e.g., BlueTeam Level1, OffSec SOC 200, Microsoft SC-200, SC-900, or similar);
Familiarity with SIEM tools, EDR/XDR/NDR solutions, SOAR tools, and Threat Intelligence tools;
Experience with information system protection tools (Firewall, IDS/IPS, SIEM);
Knowledge of security assessment tools and information system protection tools;
Proficiency in network traffic and protocol analysis.
Required Qualifications and Experience
Bachelor’s or Associate’s degree in computer science, electrical engineering, or a related technical field.
Minimum of 1 year of experience in a SOC (Security Operations Center) environment.
Knowledge of server and workstation operating systems (Windows, Linux, UNIX, macOS).
Proficiency in English language.
Willingness to work in shifts.
What we offer
Apply for this position
If you are interested in this position, submit your resume below.