Our client is recognized for its innovation, cutting-edge technology, and strong commitment to security, integrity, and employee development. You'll be joining a collaborative global environment where continuous improvement, learning, and career growth are supported and encouraged.
Responsibilities:
- Lead advanced investigations on escalated security incidents, analyzing logs across firewalls, network devices, web proxies, IDS/IPS, AV and EDR platforms.
- Perform root cause, scope, and impact analysis; develop containment and remediation steps; document findings throughout the incident lifecycle.
- Guide and mentor CSOC Analysts to improve triage quality and event handling.
- Tune and optimize SIEM and EDR tools to reduce false positives and enhance detection accuracy.
- Conduct proactive threat hunting and leverage threat intelligence to identify suspicious activity and emerging threats.
- Support forensic and malware analysis activities as needed.
- Prepare incident reports and communicate findings to management and stakeholders.
- Contribute to the development and enhancement of incident response playbooks, procedures, and SOC processes.
- Collaborate with infrastructure and security teams to address vulnerabilities and strengthen security controls.
- Participate in post-incident reviews to identify gaps and drive continuous improvement.
- Serve as a technical escalation point for complex or high-severity incidents.
Skills & Competencies:
- Strong understanding of core network protocols (TCP/IP, DNS, FTP, etc.) and network traffic analysis.
- Proficient in packet capture and analysis tools (e.g., Wireshark) and netflow analysis.
- Hands-on experience with SIEM platforms (Splunk, QRadar, ArcSight) and EDR solutions.
- Solid working knowledge of Windows, Linux, and UNIX environments.
- Experience using threat intelligence platforms and applying intel to proactive detection.
- Familiarity with exploit techniques, common vulnerabilities, and attack vectors.
- Strong understanding of the incident response lifecycle, digital forensics, and malware analysis fundamentals.
- Scripting or automation capability (e.g., Python, PowerShell) to enhance detection or workflow efficiency.
- Strong analytical, communication, and problem-solving skills; ability to handle multiple priorities effectively.
Requirements:
- 3–5 years in cybersecurity or IT, including minimum 2 years in SOC or Incident Response.
- Degree in Computer Science, Information Security, or equivalent experience.
- At least one relevant certification (Security+, CEH, GSEC, or equivalent).
To Apply:
Please apply directly to this posting or email us your Resume/CV to [Confidential Information]. Due to the high volume of applications, only shortlisted candidates will be contacted.
About PFCC
We partner with the world's most sophisticated financial institutions to unlock sustainable value. By merging operational excellence with the power of AI and digital transformation, we ensure our clients are equipped to lead, not just keep pace.
Bridging the Gap between Vision and Technical Mastery, we believe that even the most advanced strategy is only as powerful as the people executing it. That is why we specialize in identifying and placing high-calibre technical talent within the world's premier financial ecosystems. Whether it's securing mission-critical infrastructure or driving global digital shifts, we connect elite IT professionals with opportunities at global financial leaders.