Security Operations Center (SOC) Engineer

1 week ago
Full-time
Mid Level
DevOps and Infrastructure
ICE Consulting

ICE Consulting

ICE Consulting specializes in providing comprehensive IT management, consulting, and cybersecurity services tailored for small and medium-sized businesses, allowing them to efficiently manage their IT needs while focusing on their core operations.

Internet Software & Services
51-250
Founded 1996

Description

  • Monitor SIEM and other event sources to assess, prioritize, escalate, and manage security alerts.
  • Develop and implement SIEM solutions internally and for clients, including operational tools and processes for SOC use.
  • Build and maintain SIEM content such as use cases, dashboards, reports, rules, filters, trends, and lab sessions.
  • Administer and operate the SIEM platform, including maintaining log sources, parsers, alerts, reports, and platform health.
  • Analyze security, network, database, and application logs to correlate events and build threat scenarios.
  • Lead imminent threat and zero-day response activities across the environment.
  • Translate threat intelligence into actionable security controls across firewall, IPS, and malware detection platforms.
  • Track and resolve security incidents and collaborate with other teams to drive resolution and improvements.
  • Build custom connectors and parsers for devices or assets not supported out of the box.
  • Own and continuously fine-tune key security solutions to reduce false positives and false negatives.

Requirements

  • 2 to 5 years of professional experience.
  • Bachelor’s degree in an IT-related discipline.
  • At least 2 years of information security, auditing, or risk management experience in lieu of certifications.
  • Deep technical knowledge of system security and SIEM implementation.
  • In-depth understanding of Security Event Management from both technology and process perspectives.
  • Demonstrated knowledge of TCP/IP networking and major protocols including HTTP, SSL/TLS, DNS, and SMTP.
  • Experience with SIEM and related tools such as QRadar, Sentinel, Splunk, LogRhythm, Wazuh, or ELK.
  • Experience with vulnerability scanning tools, File Integrity Monitoring, and Data Loss Protection.
  • Ability to develop security scripts in PowerShell or Python for automated detection and scanning.
  • Experience with network stream analysis using PCAP data and packet reconstruction.
  • Experience executing incident response frameworks and handling procedures such as NIST and SANS.
  • Working knowledge of the MITRE framework for adversary tactics and techniques.
  • Understanding of information security and compliance regulations such as ISO 27001, PCI DSS, and GDPR.
  • Excellent problem-solving, troubleshooting, and documentation skills.
  • Fluency in English, written and spoken.
  • Ability to work independently, as part of a team, and travel as needed.

Interested in this position?

Apply directly on the company website

Apply Now

Similar Roles

Sr. Network Security Engineer III (Clearable) (6563)

MetroStar 251-1K IT Services

MetroStar is hiring a Sr. Network Security Engineer III to secure and harden mission-critical federal network environments while supporting secure mission delivery for a high-visibility customer.

Agile Cisco Fortinet IDS IPS
3 hours, 25 minutes ago

GSOC Lead Security Officer

Axon 1K-5K Professional Services

Axon is hiring a Global Security Operations Center team member to oversee shift security operations, monitor incidents, and coordinate response efforts to help protect employees, assets, and global operations.

4 hours, 41 minutes ago

Mid-Level DevSecOps Consultant - AWS/CMMC

Trility Consulting 51-250 Internet Software & Services

Trility Consulting is hiring a Mid-Level DevSecOps Consultant to design and operate a CMMC-aligned GitLab platform for a regulated aerospace environment on Kubernetes.

Argo CD AWS CI/CD DevSecOps GitLab GitOps Kubernetes Terraform
8 hours, 34 minutes ago

Threat Researcher

SecurityScorecard 251-1K IT Services

SecurityScorecard is hiring a Threat Researcher to produce original cyber threat intelligence and turn it into customer-facing research, briefings, and content that supports its platform, events, and commercial growth.

Content Marketing Cybersecurity GitHub Kafka LLM Python Splunk
8 hours, 41 minutes ago

You're on a roll! Sign up now to keep applying.

Sign Up

Already have an account? Log in

Used by 14,729+ remote workers