Job description:
· Consistent and regular attendance is an essential function of this job.
· Detect, respond and / or escalate issues with CSOC tools in a timely fashion.
· Maintain and review CSOC tools so that they continue to be effective in detecting cyber threats.
· Operationalize new tools introduced as part of Global CSOC initiatives environment.
· Review and update Cyber Security Operations Engineering runbooks timely.
· Collect, review and analyze Cyber Security Operations Engineering metrics and trending, including the health of the security monitoring systems timely.
· Ensure IT compliance within CSOC tools.
· Ensure CSOC tools compliance to regulatory requirements.
· Coordinate with other stakeholders to resolve cases, where required.
· Support CSOC in reviewing, enhancing and updating tools used by CSOC.
· Performs other related duties as assigned.
· On-call for any technical issues affecting the availability of CSOC tools.
Requirements
· Degree or Diploma with at least 2-5 years of work experience in supporting, reviewing and administering tools used in a Global CSOC environment.
· Professional cyber security engineering / tool related membership / certification is required.
· Experience in Integrated Resort, Banking or Critical Infrastructure InfoComm Industry is preferred, but not a must.
· Proven effective verbal and written communication skills.
Skills required:
· Applying host/network access controls (e.g., access control list).
· Tuning sensors / tools
· Using incident handling methodologies.
· Securing network communications.
· Protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).
· Troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution.
· Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
· System, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege.