Job Summary :
We are looking for an experienced SOC Administrator to join our cybersecurity team. The ideal candidate will have strong hands-on experience in managing and developing use cases within Security Information and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) platforms. You will play a critical role in the detection, analysis, and response to security incidents while maintaining and optimizing SOC infrastructure and tools.
Key Responsibilities :
- Administer, configure, and maintain SIEM and SOAR platforms (e.G., Palo Alto XDR / XSOAR, Splunk, Sentinel, QRadar).
- Develop, fine-tune, and manage use-cases, rules, correlation logic, and automation playbooks.
- Monitor and analyze security events, logs, and alerts to identify potential threats or incidents.
- Ensure effective log collection, normalization, aggregation, parsing, and enrichment of data from various sources.
- Collaborate with security analysts, incident responders, and engineering teams to ensure timely response and remediation.
- Script and automate routine security processes using languages like Python or Bash.
- Document system configurations, procedures, and processes.
- Stay up-to-date with current cyber threats, vulnerabilities, and mitigation techniques.
Required Skills and Qualifications :
Bachelor's degree in Computer Science, Information Security, EXTC, or a related field.3+ years of experience in cybersecurity, with a focus on SOC operations and SIEM / SOAR administration.Strong understanding of SIEM / SOAR concepts : log collection, correlation, normalization, parsing, automation workflows.Experience with platforms such as Palo Alto XDR, XSOAR, Splunk, Sentinel, QRadar, or ArcSight.Proficiency in scripting languages (e.G., Python, Bash) for automation tasks.Relevant certifications are highly desirable (e.G., CISSP, CCSP, CompTIA Security+, etc.).In-depth knowledge of cyber threats, attack vectors, TTPs, and defense mechanisms.