solutions, and security tools (Nozomi Guardian, Armis, Claroty, Microsoft Defender for IoT). Establish and enforce a security policy framework for supply chain technologies. IncidentResponse & Threat Management Develop and lead incidentresponse plans to handle security threats. Conduct risk assessments and implement remediation plans without … global team at strategic, tactical, and operational levels. Current knowledge of industry and regulatory trends in enterprise technology. Specialization in security domains such as incidentresponse, security posture assessment, and security management. Thorough understanding of Security Management and Governance principles. Good knowledge of MITRE Framework, IEC 62443, NIST More ❯
Analysts and providing more in-depth analysis of potential threats to the organization. This role is crucial in the escalated investigation, triage, and response to cyber incidents while supporting the development and training of Tier 1 Analysts. The Tier 2 Analyst works closely with senior and junior analysts to … ensure a seamless SOC operation and acts as a bridge between foundational and advanced threat detection and response functions. Responsibilities: Conduct escalated triage and analysis on security events identified by Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing … correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring rapid response and adherence to service Tier objectives (SLOs). Investigate potential security incidents by conducting deeper analysis on correlated events and identifying patterns or anomalies More ❯
or activity considered to be unauthorised, unexpected or illegal Responding to incidents, utilising a catalogue of playbooks Escalation of complex incidents to Tier 2 IncidentResponse Teams Review and develop existing security controls in line with a constantly growing technical environment Triage and Review Vulnerability Scanning Reports, feeding … and develop understanding of security as a discipline Experience (Essential) Previous experience in Security, SOC or related technical field with desired, specific focus on Incident Management Vulnerability Management Relevant qualification(s) in Cyber Security, or other related technical roles Examples Degree in Cyber Security, Computer Science, Networks etc. Professional … limited to) cloud computing, SIEM, Vulnerability Scanning/Management etc. Understanding of some (or all) of the following: Key Concepts of Cloud Computing Security Incident Management Risk Management Information Security (CIA) Phishing, Ransomware and other key threats IDAM (Identity and Access Mgmt) JML (Joiners, Movers and Leavers Processes) Security More ❯
Responsibilities and Tasks Monitoring systems for security alerts, intrusions, or unauthorized activities Responding to incidents using established playbooks Escalating complex incidents to Tier 2 IncidentResponse Teams Reviewing and developing security controls in a growing technical environment Triaging and reviewing vulnerability scanning reports, providing feedback to technical teams … like CompTIA, ISACA, etc. Technical qualifications such as cloud computing, SIEM, vulnerability management, etc. Experience (Nice to have) Understanding of concepts like cloud computing, incident management, risk management, information security (CIA), phishing, ransomware, IDAM, JML processes, security awareness, and information classification. About SiXworks SiXworks specializes in secure digital solutions More ❯