Description
We are currently looking for a Security Specialist - SOC analyst for my client based in Brussels, Belgium.
Job description
Conducting incident response operations according to documented procedures and industry best practices.
Must have extensive experience in multiple security areas such as SIEM, IDS, APT and WAF.
Participate in multiple intelligence communities and be able to disseminate pertinent information throughout the SED.
Extensive experience in Linux and/or Windows operating systems as well as having a deep knowledge of networking and attack methods such as SQLi and pivoting.
Hunting for suspicious anomalous activity based on data alerts or data outputs from various toolsets
Review and build new operational processes and procedures
Provide first responder forensics analysis and investigation
Drives containment strategy during data loss or breach events
Triage and resolve advanced vector attacks such as botnets and advanced persistent threats (APTs)
Works directly with data asset owners and business response plan owners during low and medium severity incidents
Advice on the tuning of IDS, Proxy policy, in-line malware tools based on threat feeds, trust and rotation data, incidents or vulnerabilities and exploits of downstream systems.
Provide use case creation/tuning recommendations to administrators based on findings during investigations or threat information interviews
Lead response actions for incidents where CIRT is not required to intervene (low/medium priority)
Performing administrative tasks per management request (ad-hoc reports/training)
Functional and Technical competencies
Passion and drive to work in start-up division with potential of significant growth in scope and services
Possess good logical and analytical skills to help in analysis of security events/incidents
Experience of network security zones, Firewall configurations, IDS policies
In depth knowledge TCP/IP
Knowledge of systems communications from OSI Layer 1 to 7
Experience with Systems Administration, Middleware and Application Administration
Experience with Network and Network Security tools administration
Knowledge of log formats and ability to aggregate and parse log data for syslog, HTTP logs, DB logs for investigation purposes
Ability to make create a containment strategy and execute
Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Netcat)
Good knowledge of threat areas and common attack vectors (malware, phishing, APT, technology attack etc)
If this sounds of interest to you, please send your CV.