Description:
Context:
Security Operations Center (SOC) delivers the following capabilities to the Group entities around the globe: Security Monitoring and Detection, Security Incident Response and Threat Intelligence. There are 2 transversal services of the SOC allows increasing coverage and overall detection capability which are Log Onboarding Factory and Use Case Factory.
This mission is a part of Use Case Factory.
We are looking for the service of an external SOC Detection Expert with an expertise of detection engineering , responsible for designing, developing, and implementing detection use cases to increase the client threat detection capability and meet stakeholder requirements. The mission also requires being conversant with performing complex data manipulations and analysis.
2) Scope of Service - The Service will do the following
* Detection Use Case Development: Design and implement detection use cases and playbooks tailored to identify both known and emerging threats within the organization's environment.
Create custom update polices leveraging KQL and regex
* Rule Creation & Optimization: Develop and fine-tune rules, signatures, and logic in SIEM, EDR, and NDR platforms to detect suspicious activities effectively while minimizing false positives. Maintain and define the detection engineering DevOps processes and toolset.
* Threat Monitoring: Collaborate with SOC analysts to ensure that detection mechanisms are performing as intended and adjust them based on feedback and real-world events.
* Automation & Integration: Work with the automation team to integrate detection capabilities into SOAR platforms, streamlining response processes and enhancing efficiency. Develop automated attack scenarios to continuously test use cases under development. Develop automation strategies to improve detection and investigation capabilities.
* Collaboration with Threat Intelligence Teams: Utilize threat intelligence feeds and indicators to enhance detection mechanisms, ensuring that detection logic is informed by the latest threat actor TTPs (Tactics, Techniques, and Procedures).
* Collaboration with Incident Response & Threat Hunting Teams: Partner with incident response and threat hunting teams to validate detection efficacy and refine strategies based on incident learnings.
* Documentation & Expertise Sharing: Document detection strategies, rules, and processes, and share expertise with SOC teams to improve overall operational readiness.
* Continuous Improvement: Stay updated on the latest developments in cybersecurity and detection technologies, continuously improving and refining detection methodologies.
* Metrics & Reporting: Assist in tracking and reporting on the effectiveness of detection strategies, providing insights to improve SOC operations.
Nous sommes SThree. Le partenaire mondial des talents spécialisés dans les STEM.
Nous mettons en relation des spécialistes recherchés en sciences, technologies, ingénierie et mathématiques avec des organisations dynamiques grâce à nos différentes marques (Computer Futures, Huxley et Real Staffing)
Nous recrutons des professionnels hautement qualifiés - contractuels ou permanents - quand et où ils sont nécessaires.
En réunissant des personnes compétentes, nous élevons le niveau d'expertise et accélérons le progrès pour tous. C'est ainsi que nous construisons l'avenir.
Analyste SOC, Analyste N1, N2, N3, Incident Manageur, Head of SOC, IR & Forensics, Pentesteur
Analyste SOC, Analyste N1, N2, N3, Incident Manageur, Head of SOC, IR & Forensics, Pentesteur
Analyste SOC, Analyste N1, N2, N3, Incident Manageur, Head of SOC, IR & Forensics, Pentesteur
Analyste SOC, Analyste N1, N2, N3, Incident Manageur, Head of SOC, IR & Forensics, Pentesteur
Analyste SOC, Analyste N1, N2, N3, Incident Manageur, Head of SOC, IR & Forensics, Pentesteur
Analyste SOC, Analyste N1, N2, N3, Incident Manageur, Head of SOC, IR & Forensics, Pentesteur