Dive deep into Digital! For 20 years Intellias has been developing top-tier digital solutions for the world’s leading companies, keeping them in line with the latest technology trends. Join in and provide innovations for the future!
What project we have for you
Please provide detailed Client/Project description:
What you will do
Basic Threat Containment: Take limited containment actions under strict guidelines, such as isolating suspicious hosts (when permitted). These guidelines need to be established for internal Platform level accounts, as well as for customer (digital product) accounts.
Threat Intelligence Correlation: Leverage threat intelligence sources to correlate indicators and identify broader threat campaigns or tactics used by attackers. There are often security communities / forums where trusted industry professionals post information about active attacks they are seeing. Crowd-sourced threat intel can also be useful.
Containment & Mitigation: Coordinate with product teams to implement containment measures (e.g., blocking IPs, disabling accounts, quarantining devices) and lead initial remediation efforts. During these occurrences consult with product teams about their appetite for participating in automatic remediation / mitigations. Report that to L3. In order to perform remediation (either manually or through automation) on behalf of a product, agreements must be in place that indicate which containment measures are authorized to be performed.
Incident Handling: Act as the primary handler for incidents, leading analysis, investigation, and coordination efforts until resolution.
Root Cause Analysis: Conduct detailed root cause analysis on incidents and assist with recommendations for future prevention.
Playbook & SOP Enhancement: Review and update incident response playbooks and procedures to reflect new threats and improve efficiency. Based on feedback from L1 or if identified that an area does not have a runbook created – develop such a runbook if possible. Consult L3 in case L2 is unable to deliver the runbook themself.
Escalation to L3: Escalate complex or high-impact incidents to L3 with a detailed analysis and recommendations.
What you need for this
5+ years of experience as SecOps engineer
Good knowledge of network and Cloud security, including malware analysis and packet analysis. Forensic experience is also a plus.
Hands-on experience with Splunk and AWS environments
Experience with threat intelligence and incident response tools.
Strong problem-solving skills and ability to handle more complex or persistent threats.
Security Certification(s) and/or strong educational background in security, as well as experience working in a SOC.
Basic knowledge of Python or any other scripting language
What it’s like to work at Intellias
At Intellias, where technology takes center stage, people always come before processes. By creating a comfortable atmosphere in our team, we empower individuals to unlock their true potential and achieve extraordinary results. That’s why we offer a range of benefits that support your well-being and charge your professional growth.
We are committed to fostering equity, diversity, and inclusion as an equal opportunity employer. All applicants will be considered for employment without discrimination based on race, color, religion, age, gender, nationality, disability, sexual orientation, gender identity or expression, veteran status, or any other characteristic protected by applicable law.
We welcome and celebrate the uniqueness of every individual. Join Intellias for a career where your perspectives and contributions are vital to our shared success.
By enabling them, you help us to develop and deliver better services in the way that's most convenient for you. For information and settings, see our Cookie Policy.