Loading...

@

  • jobs
  • 1 month ago

jobs description

Security Operation Centre (SOC) Analyst

We are an American based remote company, and looking to hire an SOC Analyst with experience in the financial services industry, to join our exciting remote team.

Yellow Card is one of the fastest growing cryptocurrency exchange companies in Africa and is aiming to make cryptocurrency accessible to everyone on the continent. We recently announced a $50M Series B fundraise, the largest by an African cryptocurrency exchange, which was backed by some of the biggest names in the industry.

Yellow Card is looking for a SOC Analyst (AWS cloud centric) who is passionate about protecting the business from cyber attacks.

As a SOC analyst you will be responsible for monitoring and auditing Yellow Card’s AWS cloud infrastructure and business systems, responding promptly to alerts, prioritizing, triaging, and working with the team on timely remediation of discovered vulnerabilities and malicious activity.

Top candidates are diligent, organized, and have... a strong sense of urgency and accountability. They are clear communicators who are highly self-motivated; proactive, eager to collaborate, exchange knowledge, and keep on learning and developing in their role.

Type of person

Critical thinker, organized and driven, with a strong knowledge domain. Dedicated and passionate about their job, humble and a real team player.

Job Type: Remote

Salary: Based on experience

Qualifications
• Bachelor’s degree in Computer Science, Information Technology or related discipline
• AWS certification preferred
• CISSP or other industry recognized cyber security certification preferred

Key responsibilities
• Perform real-time alert monitoring across our cloud Infrastructure and business systems
• swiftly triage and respond to threats
• Initiate and track complex, multithreaded investigations to resolution
• Timely support for all Identity and Access Management requests
• Stay up to date with and report on information security issues and emerging trends
• Integrate and share information effectively with other analysts and teams
• Creation of reports, dashboards, KPIs, metrics for SOC operations
• Assist security operations and engineering team where needed
• Develop documentation and operational playbooks, as well as suggest alert enhancements to improve detection capability
• Identify gaps in processes and procedures, defining solutions, escalating to appropriate teams, and supporting implementation to promote consistency in service delivery.
• Develop and integrate monitoring and detective capabilities through technologies such as DLP, MDM etc.
• Develop SIEM use cases for monitoring, investigative techniques, and health checks for optimization and assurance of logging all required systems
• Monitor the functioning of security systems to ensure the system operates in conformance with expected performance and specifications
• Evaluate SOC operating procedures for operational efficiencies and updates to monitoring rules and use cases
• Develop ways to optimize or automate processes
• Create and modify security SIEM dashboards to clearly identify scope of findings, or monitor activity
• Provide expert analysis investigative support of large scale and complex security incidents, and in many cases identify incidents for which a technical detection may not be available.

Expected Skills
• 5+ years of experience in AWS cloud infrastructure with a focus on cyber security
• Demonstrate proficiency in AWS Security with hands-on experience in SQS, SNS, IAM, Lambda, API Gateway, S3, DynamoDB, Cognito, CloudTrail, and Step Functions.
• In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management, etc.
• 3+ years of SOC/IR experience, including incident response triage, threat hunting, digital forensics, and configuring alerting rules
• Utilize and incorporate MITRE ATTACK Framework and Cyber Kill Chain
• Working knowledge of security technologies such as: SIEM, EDR, FW, AD, IPS, SOAR, WAF, CTI, Application and Email Defense, Sandbox
• Utilize Datadog as both a SOC and incident management platform, leveraging its capabilities to enhance security operations.
• experience working within a Security Operations Center (SOC), including the ability to build purposeful dashboards, rules, and monitors that contribute to effective threat detection and response.
• proficiency in incident management, highlighting hands-on experience in handling security incidents from identification to resolution.
• capability in securing a data pipeline, emphasizing your expertise in monitoring for suspicious activities and implementing effective security controls throughout the data life cycle.
• experience in threat modeling for AWS services' infrastructure and SaaS applications in general,
• experience in adhering to compliance standards, specifically ISO27001 and SOC2
• Ability to perform deep dive investigations from start to finish of a security incident
• Fluency in spoken and written English
• Demonstrate a self-starter mentality, collaboration skills, sense of urgency, strong attention to detail, and ability to operate in a customer-oriented environment

Expected Attributes
• Exhibit a proactive mindset, showcasing your ability to identify problems, gaps, and actively research potential solutions and initiatives to enhance security measures.
• Team player open to assisting other teams and team members within a startup environment
• Capable of assuming responsibility for assigned tasks and seeing them through to completion, while also adept at extracting new projects or lessons learned from the undertaken work.
• Proficient in establishing a systematic approach to sharing knowledge with team members operating within the same functional area.

Team
• Exude your upbeat energy and enthusiasm each and every day to motivate your team to be the best they can in every aspect of what they do
• Celebrate the success of others by recognising the contributions of committed team members and their achievements
• Align your values with the Mission, Vision and Values of our team
• Be a role model for the our organizational culture by creating a positive impact at every touchpoint with people, with every word you say or put in print and everything you do
• Communicate in a fashion that is respectful and well understood
• Collaborate with your peers to collectively think of innovative ideas that drive business through technology
• Build and utilize working relationships with internal business partners across the organization and external business contacts

Do we spark your interest? Then send us your CV today!

We are looking forward to hearing from you
Italy

salary-criteria

Apply - Security Operation Center Analyst Italy