Perform incident analysis and response for escalated incidents.
Communicate with SOC management & senior SOC staff members regarding investigations and status updates.
Design, create and maintain custom SIEM content (creation, evaluation and tuning of rules, reports, dashboards, etc.)
Design, create and maintain custom tools that support incident handling and response activities.
Responsible for the continuous availability and support of the on premise and cloud SOC infrastructure.
Maintain and support client’s SIEM infrastructure.
Manage system health and capacity utilizing monitoring tools.
Requirements
At least 1 years of experience in incident analysis and response activities. Experience in a SOC environment is preferred.
Demonstrated experience in a SIEM product.
Significant experience performing analysis of logs from a variety of sources.
Knowledge of current security trends, threats, and techniques.
Experience with scripting.
Good verbal and written communication skills (Greek and English)
IT Security Certifications (GCIH/GCIA/CEH/CISSP), product certifications such as SIEM certifications or ability to obtain via self-study within one year of hire date.
Exceptional Communication and Presentation skills.
Proficiency to build relationship with Peers and Leaders across the Company.