Evaluate and onboard new data sources, performing data analysis for identifying anomalies and trends, and developing dashboards and visualizations for data reporting; troubleshoot and provide support for onboarding issues with platforms like Sentinel, and Cribl
Collaborate with CSOC engineers, Threat Hunters, and CSOC Analysts to gather requirements and develop solutions, working with cross-functional teams to understand risks and develop effective detection strategies that align with organizational security goals
Validate and ensure proper configuration and implementation of new logics with security system and application owners; perform data normalization, establish datasets, and develop data models; Manage backlog of customer requests for onboarding new data sources
Detect and resolve issues in various data sources, implementing health monitoring for data sources and feeds
Provide 24x7 on-call support on a rotational basis, including weekends, to ensure system stability and incident response readiness
Design and create security detection rules, alerts, and Use Cases utilizing platforms such as SIEM, DLP, EDR, and WAF
Develop robust detection mechanisms to identify and respond to potential security threats across various security technologies
Regularly review and enhance existing detection rules and Use Cases to ensure their effectiveness and alignment with emerging threats and vulnerabilities
Requirements
University working and thinking level, degree in business/technical/scientific area or comparable education/experience
3-5 years experience in the field, with good general security knowledge
Strong expertise in Sentinel and Direct experience managing Data ingestion pipeline through Cribl
Hands on experience and knowledge of security tools (DLP, XDR, SIEM, Firewalls) and experience in Security Engineering tasks such as SIEM alert creation, SOAR playbook development
Experience in IT administration with broad and in-depth technical, analytical and conceptual skills, and exceptional understanding and knowledge of general IT infrastructure technology and systems
Experience in configuring Data collection Endpoints, connectors and parsers
Good knowledge of collectors/forwarder components, integrating Security tools using API, syslog, cloud etc
Experience in scripting and Automation for Security tools, with development experience in Python (SDKs)
Excellent communication and collaborative skills cross functionally and in global teams, with good experience in reporting to and communicating with senior level management (with and without IT background, with and without in-depth risk management background) on incident response topics.
Benefits
Monthly pension contribution matching your individual contribution up to 3% of your gross monthly base salary
Risk Life Insurance (full cost covered by Novartis)
5-week holiday per year (1 week above the Labour Law requirement)
4 paid sick days within one calendar year in case of absence due to sickness without a medical sickness report
Cafeteria employee benefit program – choice of benefits from Benefit Plus Cafeteria in the amount of 12,500 CZK per year
Meal vouchers in amount of 105 CZK for each working day (full tax covered by company)
Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
GSOC Analyst focusing on critical events and risk management operations at Netflix. Monitoring global threats and coordinating incident management efforts in a hybrid work setting.
GSOC Analyst monitoring global events and managing critical incidents for Netflix's security operations. Ensuring timely communication and assessment during major security threats.
Security Operations Center Engineer enhancing security posture via automation and threat hunting. Requires strong experience with SIEM and SOAR platforms and Python scripting.
Security Operations Vulnerability Analyst II identifying and mitigating security vulnerabilities. Collaborating with teams to ensure timely risk remediation and protection of enterprise systems.
Cyber Defender (SOC Analyst) acts as the key point of contact for major security incidents. Coordinating response efforts and enhancing procedures at a leading AI - powered security partner.
Junior SOC Analyst at Core Specialty responsible for monitoring and triaging security alerts across IT environment. This role offers hands - on experience in cybersecurity with a fast - paced operational environment.
Security Operations Coordinator overseeing security strategies and managing operations for public safety in NSW. Collaborating with law enforcement and enhancing transport system resilience with flexible work options.
Intern role in Product Security Operations for Salesforce, leading innovative AI - driven security tools and initiatives. Collaborate with experts to enhance security governance and risk management processes.
Security Operations Manager leading colleague safety and security programs at CVS Health. Responsible for managing security risks and operational performance in retail environments.