
About the Role
The Security Operations team exists to protect the client by proactively detecting and responding to cyber security threats.
Working as a member of a growing team, you will provide defence against cyber-attacks and play a vital role in the monitoring, analysis and management of security events / incidents emanating from client networks and systems. This is a hands-on operational role where you will be deeply involved in day-to-day incidents using your broad experience to combat threats and resolve incidents in a timely manner.
This role requires willingness to work shifts (including unsociable hours and bank holidays where these fall into your shift pattern) as part of a 24x7 team.
Principal Duties and Responsibilities
• Responsible for providing Tier 2 case resolution, resolving complex security cases including generating initial reporting, providing follow-ups and requesting information and resolution activity.
• Day to day incident tirage and escalation using contextual and threat intelligence
• Responsible for providing security expertise to escalated incidents
• Act as the incident handler for P1/P2 incidents
• Provide and support In-depth SIEM and Incident notification toolset administration and configuration
• Fully utilize threat intelligence capabilities for proactive threat hunting
• Responsible for providing communication directly with customers regarding security incidents and other related topics.
• Aid in the development of incident response procedures and playbooks
• Contribute to the design and development of defence and response strategies, knowledge base and playbooks.
• Monitoring SIEM alerts effectively to minimize downtime and restore services.
• Ensure investigation steps are clearly documented and accurately escalated when needed.
• Responsible for producing and maintaining documentation relevant to both the SOC and position.
• Responsible for updating and offering continual improvement to the knowledge base.
• Support the SOC team research global security events, issues and trends to produce security advisories for customers based on findings.
• Responsible for managing and configuring security monitoring tools.
• Investigating intrusion attempts and performing in-depth exploit analysis.
• Provide analytical feedback on client network traffic patterns.
• Provide analytical feedback related to malware and other network threats.
• Accept, manage and update service requests and incidents to ensure contracted Service Level Agreements are met.
• Guiding, coaching and mentoring analysts who are providing the core SOC functions, including but not limited to, alert triage, incident escalation, content creation etc.
Generic Duties and Responsibilities
• To continuously develop both technical and personal skills required within the role and assist with development of other staff.
• Keep up to date on security developments and news
• Conducting cyber threat research and analysis for purposes of improving the strength of network security.
• Assist with defining, testing and operating new ways of working with new technology solutions or processes supplied to the SOC team.
• Participate in identification and delivery of Service Improvement Plans.
• Proactively support business KPIs.
• Understand and comply with all Information Security policies.
• Follow agreed security best practices and SOC processes
• Interact with strategic incident response and threat intelligence vendors.
• To undertake other responsibilities, training and tasks as reasonably requested by line management.
• Undertake periodic assurance reviews and produce associated reporting as required.
• Participate in internal security awareness initiatives and other training requests
• Responsible and accountable for ensuring all employment legislative requirements are adhered including equality, diversity and health and safety issues.
• The job description may be altered at any time in line with the level of the post to meet changing requirements, but only in full consultation with the post holder.
Requirements
Qualifications:
Educated to BSc level, or equivalent
Cyber Security Qualification (COMPTIA or equivalent experience)
ITIL Foundation
5 year+ SOC analyst experiences
Skills, Knowledge and Experience:
Previous experience in a similar position
Knowledge and experience of SOC tooling to identify threats.
Experience of collaboration tools
Keen analytical mind and approach
Proactively shares own expertise with others
Knowledge and experience of IT systems, networking and security threat landscape including:
Network fundamentals for example OSI stack, TCP/IP, DNS. HTTPS, firewall logs, packet capture and analysis.
Cloud technologies (AWS, Google Cloud, Azure)
Active Directory, Group Policies, PowerShell
Anti-Malware / Endpoint protection applications (Antivirus, Web Filtering, ATP, Encryption, Microsoft Defender ATP, FireEye, CrowdStrike)
Intrusion Detection/Prevention Systems (IDS/IPS) (Snort, Cisco, Fortinet)
SIEM tools (IBM Qradar, Microsoft Sentinel, Splunk, ELK)
SOAR is an added advantage
Knowledge of malware capabilities, attack vectors and impact.
Knowledge of the MITRE ATT&CK framework to understand threat actors and how to mitigate them.
Knowledge and experience in threat analysis.
Vulnerability Management
Threat Hunting and Threat Intelligence (MITRE ATT&CK)
Web Proxies (Bluecoat, Cisco/OpenDNS Umbrella)
Incident Response
Networking & Firewalls (Cisco, Palo Alto, Checkpoint)
Penetration Testing
Programming (Python, or other languages)
Personal Qualities:
Excellent interpersonal skills sufficient to develop professional relationships and rapport amongst key stakeholders
Strong team player
Genuine enthusiasm and drive to work within cyber security.
Excellent customer service skills
Good written skills to write explanations of systems, regulations and or procedures.
Good verbal communication
Ability to identify and suggest continual improvement
Good analytical and problem-solving skills
Ability to adapt to organizational change
Proven ability to manage varied workload
Ability to work unsupervised and under pressure.
Language:
Fluent Chinese and English
About the Company
Genesis Communications Limited, established in 2019 and headquartered in London, is a leading IT information services company with a global workforce partnership approach. Specializing in Internet Data Centers (IDC), we collaborate with key facilities such as Digital Realty, Telehouse, ARK Datacentre, Equinix, delivering end-to-end solutions in design, supply, installation, and commissioning.
Beyond IDC, we offer unparalleled recruitment and workforce solutions, guiding professionals in their careers and helping organizations bridge skills gaps. What sets us apart is our commitment to providing insights and expertise for the fast-paced world of work.
At Genesis Communications Limited, we pride ourselves on a proven track record in IDC contracting and a dedication to delivering exceptional solutions. As your reliable partner, we not only address current needs but also help you prepare for the future. Trust us to navigate the dynamic landscape of IT information services and workforce solutions with you.