Job ID :
Company :
Internal Postings
Location :
Long Beach, CA
Type :
Salary :
Status :
Openings :
Posted :
06 Feb 2019
Job Seekers, Please send resumes to

Minimum years of experience*: 8

Certifications Needed: No

Responsibilities you would expect the Subcon to shoulder and execute*:

  • Experience in Handling Tier1 to Tier3 SOC Teams.
  • Experience in Handling 24X7 Environment.
  • Managing Customer escalations, vendor management.
  • Review all incident records regularly to ensure they were resolved within the parameters of the defined severity levels.
  • Audit incident records that have exceeded standard resolution times
  • Review of the SOC processes and procedures regularly and update the documents.
  • Experience with Security Events Monitoring, Deep Investigations, Forensics, Threat Hunting, Malware Reverser etc.
  • Experience in Implementing Next - Gen-Security Operations Center
  • Experience in Operating and Maintaining a SOC
  • Leadership skills to manage and motivate diverse, high performance teams.
  • Knowledge of reporting capabilities of SIEM and Integrated Metrics Reporting
  • Product Knowledge of SIEM tools like Qradar, ELK, Splunk, Arcsight, Logrhythm etc.
  • Deploying the use cases in real time environment and monitoring, fine-tuning accordingly based on the analysis and customer requirement
  • Creation of SOPs and knowledge base documents
  • Reducing false positive alerts with proper analysis post customer approvals with helps to improve the performance of Logs Monitoring
  • Preparation of Daily, weekly Monthly Reports with analysis and presenting the same to the customer in weekly call
  • Weekly and monthly status reports to higher management
  • Participate in business meetings with various stake holders
  • Take corrective actions based on the customer satisfaction surveys
  • Drive service improvement programs
  • Effort estimation/ reviews on need basis for new projects

Job Requirements:

  • Ideal Candidate should have at least 10-12 years' experience focused on the SOC Operations, design, SIEM Implementation, 24X7 team management
  • Have worked with CIRT teams, experience in ATP, DDoS, Phishing, Malicious Payloads, Malware etc.
  • Have deep understanding of advanced Security Analytics, Forensics, and Cybersecurity Frameworks, Critical Incident Response/ Breach Response etc.
  • Broad Understanding of Security Domains including Network Security, Cloud Security SIEM, DLP, IDAM, App Sec. GRC etc
  • Good teamwork, Willingness to learn and inspire the team
  • Creativity, able to analyze and solve problems and able to work within pressure
  • Able to work with multiple customers at a time
  • Strong analytical skills and efficient problem solving
  • Good English communication skills (written and oral)
  • SIEM Product Certifications, SANS certification, CISSP
  • Threat Modelling, Threat Hunting Kill Chain exercises
  • Knowledge on Orchestration & Automation for Security technologies
  • Ensuring SLAs are met
  • Preparation of Daily, weekly Monthly Reports with analysis and presenting the same to the customer in weekly call

Interview Process (Is face to face required?) No