SOC Tier 3 - Subject Domain Expert

SOC Tier 3 - Subject Domain Expert
Crypto.com, Hong Kong

Experience
1 Year
Salary
0 - 0
Job Type
Job Shift
Job Category
Traveling
No
Career Level
Telecommute
No
Qualification
As mentioned in job details
Total Vacancies
1 Job
Posted on
Jun 4, 2021
Last Date
Jul 4, 2021
Location(s)

Job Description

About the Company

Crypto.com was founded in 2016 on a simple belief: it's a basic human right for everyone to control their money, data, and identity. With over 10 million users on its platform today, Crypto.com provides a powerful alternative to traditional financial services, turning its vision of "cryptocurrency in every wallet" into reality, one customer at a time. Crypto.com is built on a solid foundation of security, privacy and compliance and is the first cryptocurrency company in the world to have CCSS Level 3, ISO27001:2013 and PCI:DSS 3.2.1, Level 1 compliance. Crypto.com is headquartered in Hong Kong with a 1000+ strong team. For more information, please visit: https://crypto.com/


About the Role

The SOC team utilizes multiple security technologies and produces enhancements that allow SOC members to work collaboratively and efficiently while responding to threats. The individual in this role will work as a tier 3 analyst in the SOC team and be responsible for support 24x7 operations.

The SOC Tier 3 role will be a subject matter expert whose responsibilities associated with:

  • possessing in-depth knowledge on network, endpoint, threat intelligence, forensics and malware reverse engineering, as well as the functioning of specific applications or underlying IT infrastructure;
  • acting as an incident hunter, not waiting for escalated incidents;
  • involving closely in developing, tuning and implementing threat detection analytics.
  • investigating Incidents escalated from Tier I and II incident responders for the SOC;
  • conducting technical amp; forensics investigations / for security incidents;
  • providing process improvements, and driving implementation of new capabilities.

The role will serve as a technical escalation resource for other SOC Analysts and provide mentoring for skill development. The individual is also expected to cooperate with other Security Engineers to implement and improve technology and process to enhance SOC monitoring, investigation, and response.


Responsibilities:

  • Conduct multi-step breach and investigative analysis to trace the dynamic activities associated with advanced threats
  • Perform investigation and escalation for complex or high severity security threats or incidents
  • Serve as an escalation resource and mentor for other analysts
  • Work with SIEM Engineering and other security partners developing and refining correlation rules
  • Work on complex tasks assigned by leadership, which may involve coordination of effort among Level 1/2/3 analysts
  • Coordinate evidence/data gathering and documentation and review Security Incident reports
  • Assist in defining and driving strategic initiatives
  • Create and develop SOC processes and procedures working with Level 3, Level 2 and Level 1 Analysts
  • Provide recommendations for improvements to the company Policy, Procedures, and Architecture based on operational insights
  • Define and assist in creation of operational and executive reports
  • Define tool requirements to improve SOC capabilities
  • Develop incident response playbooks / runbooks
  • On-call is needed in case of emergency like incidents

Requirements

  • 5+ years of SOC experience
  • Expert knowledge in one or more of the following: Incident Response / Live Forensic / Cloud Forensic / Threat Intelligence / Intrusion Analysis / Malware Analysis / Reverse Engineering
  • Good understanding of all the domains listed above
  • 7+ years of technical experience in Information Security, System Administration, or Network Engineering with at least 5 - 7 years of experience in Information Security
  • Extensive experience in Incident Response, Incident Handling and Security Operations
  • Advanced knowledge and expertise of using SIEM technologies for event investigation
  • Basic understanding of incident handling/incident response techniques within a cloud-based environment such as Google Cloud, Azure or AWS
  • Security Certificates preferred: GCIH / GCIA / GNFA / CISSP / OSCP etc.

Job Specification

Job Rewards and Benefits

Crypto.com

Information Technology and Services - Sofia, Bulgaria
© Copyright 2004-2024 Mustakbil.com All Right Reserved.