SOC Engineer – Contract C2C Job requirements – Mountain View, CA

Contract

soc engineer jobs

SOC (Security Operation Center) Engineer

Location: Mountain View, CA (Highly preferred) or Littleton, CO {Need to work onsite from either of these locations)

Duration: 6 months to start with can extend up to 12 months with a possibility of converting to Full-time

 

Notes from the HM’s intake call:

Looking for someone hands-on with Python.
Need any database experience like MySQL, NoSQL, etc.,
Some Linux experience.
Perform analysis.
Can perform automation.
Experience with AWS/Azure/GCP is desired but not mandatory.
Someone passionate about security.
Don’t need a Network Engineer.
Don’t need a manager, need a hands-on developer (junior to mid-level).
 

Job Summary:

The SOC Engineer will monitor, detect, analyze, and respond to security incidents affecting the SPC environment. You will leverage your automation skills to streamline SOC operations and enhance incident response capabilities. The candidate must have robust oral and written documentation and communication skills. This position should bring prior analytical problem-solving skills, sound judgment, knowledge, and expertise in IT Security.

 

 

Job Responsibilities:

Monitor security event management systems (targe) and other tools to detect security incidents and anomalies.
Investigate and analyze security incidents, determine root causes, assist in vulnerability assessments, and manage remediation efforts.
Develop and implement automation scripts and workflows to improve SOC efficiency, including incident response automation and playbook creation.
Perform in-depth analysis of logs to identify indicators of compromise (IOCs) and potential security breaches.
Develop and maintain incident response plans and procedures to ensure optimal response to security incidents.
Coordinate with analysts and other stakeholders to promptly escalate and respond to security incidents.

Provide guidance and mentorship to analysts on incident detection, analysis, and response techniques.
Participate in security incident tabletop exercises and simulations to test and improve incident response capabilities.
Stay up to date with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
Contribute to continuous improvement initiatives within the SOC, including process refinement and tool enhancement, and generate SLI/SLO-related metrics to show improvements.
Act as one of the information security subject matter experts for the Incident Response team and assist in escalations impacting Joyent.
Yearly travel may be required for approximately one to two weeks per year, subject to change as business requirements evolve.
 

Qualifications and Requirements:

Must have a solid understanding of information technology and security best practices.
Hands-on cloud experience; one or more of AWS, Azure, GCP – desired but not required.
Collaborate effectively with teams across different functions.
Must possess a basic understanding of network routers, switches, and firewalls.
Passionate about automation, performance, reliability, visibility, and finding creative solutions to complex security issues using Python.
Proficient in Linux, including understanding security hardening for Linux, web applications, and databases such as PostgreSQL and MariaDB.
Experience with Kubernetes is a plus.
Familiarity with open-source security tools and applications.
Strong attention to detail with exceptional organizational skills
Availability to work in a 24/7 environment, including weekends and holidays, with on-call duties.
5+ Years of experience.
 

 

 

Thanks &  Regards 
 
 
 
 
 
 

Mohd Faisal 

 

To apply for this job email your details to md.faisal@signinsol.com