About the Role
We are looking for a Network Security Engineer / Senior SOC Analyst to strengthen our Security Operations Center for a fast-growing IT organization with 700+ employees and a diverse technology landscape.
Our environment includes:
- 400+ Linux systems, 200+ Windows machines, and 200+ macOS endpoints
- Development stack: Node.js, Ruby on Rails (RoR), Rust, Blockchain platforms
- Domains: Mobile applications, gaming platforms, FinTech systems
- Infrastructure: Multi-cloud (AWS, Azure, GCP)
This role is ideal for professionals who thrive in complex, high-scale environments and can actively monitor, detect, investigate, and respond to security threats across infrastructure, endpoints, and applications.
Key Responsibilities
- Monitor and analyze security alerts from SIEM, EDR, IDS/IPS, and cloud security tools
- Perform real-time threat detection, triage, and incident response across Linux, Windows, and macOS systems
- Investigate suspicious activities in multi-cloud environments (AWS, Azure, GCP)
- Conduct log analysis and correlation across infrastructure, applications, and network layers
- Manage and tune SIEM platforms (e.g., Splunk, LogRhythm, ELK)
- Handle incident lifecycle: detection → analysis → containment → remediation → reporting
- Perform endpoint and server-level investigations, especially on Linux-heavy environments
- Support threat hunting activities and identify advanced persistent threats (APTs)
- Perform vulnerability analysis and coordinate with engineering teams for remediation
- Assist in cloud security monitoring including IAM anomalies, misconfigurations, and suspicious activity
- Maintain incident response playbooks, SOPs, and documentation
- Generate security reports, dashboards, and metrics for leadership
- Support compliance requirements (ISO 27001, internal audits, security controls)
Must-Have Qualifications
- 8+ years of experience in SOC, Security Operations, or Incident Response
- Strong experience in SIEM tools (Splunk, ELK, LogRhythm, QRadar)
- Hands-on experience with EDR/XDR tools (CrowdStrike, SentinelOne, Defender, etc.)
- Strong understanding of Linux security (critical), plus Windows and macOS environments
- Knowledge of networking concepts (TCP/IP, DNS, firewalls, VPNs)
- Experience in log analysis, threat detection, and incident triage
- Exposure to multi-cloud environments (AWS, Azure, or GCP)
- Familiarity with web/app security basics (Node.js, APIs, backend services)
- Understanding of common attack vectors (MITRE ATT&CK, OWASP Top 10)
- Experience with vulnerability management tools
- Basic scripting/automation using Python, Bash, or PowerShell
- Strong analytical and troubleshooting skills
Preferred / Nice-to-Have
- Experience in FinTech, blockchain, or gaming environments
- Exposure to Rust-based systems and blockchain node security
- Familiarity with DevSecOps and CI/CD security monitoring
- Experience with threat intelligence platforms
- Knowledge of container security / Kubernetes
- Certifications such as Security+, CEH, CySA+, CISSP (or pursuing)