DescriptionSecuronix provides the Next Generation Security and Information Event Management (SIEM) solution. As a recognized leader in the SIEM industry, Securonix helps some of largest organizations globally to detect sophisticated cyberattacks and rapidly respond to these attacks within minutes. With the Securonix SNYPR platform, organizations can collect billions of events each day and analyze them in near real time to detect advanced persistent threats (APTs), insider threats, privilege account misuses and online fraud. Securonix pioneered the User and Entity Behavior Analytics (UEBA) market and holds patents in the use of behavioral algorithms to detect malicious activities. The Securonix SNYPR platform is built on big data Hadoop technologies and is infinitely scalable. Our platform is used by some of the largest organizations in the financial, healthcare, pharmaceutical, manufacturing, and federal sectors.
Roles and Responsibilities:
Design and implement automated detection and alerting for potential security incidents for Cloud services.
Develop and maintain technical incident response playbooks, lending your knowledge and experience to those involving Cloud services.
Perform information security incident handling and respond to customer inquiries.
Stay current with information security developments, e.g., vulnerabilities, threat activity, attacker techniques and countermeasures.
Experience with monitoring or configuring Kubernetes / Cloud containers
Experience with threat detection
Experience with MITRE framework
Experience with troubleshooting and fine tuning of Cloud detections and alerts
Experience in technical handling and responding to customer inquiries.
Expertise with cloud technologies, including AWS, Azure and GCP.
Industry certifications specifically around Azure and GCP are a plus.
Experience implementing / detecting control gaps on Cloud Service
Experience working with Azure or GCP in a production environment.
Have built and operated cloud security infrastructure including policy, scanning, detection and log analysis
Experience implementing or supporting cloud based security solutions like Prisma Cloud, Azure Security Center, AWS CloudTrail, Guard Duty, AWS Config, Log Analytics, Azure Monitor, Cloud Health etc not mandatory but preferred.
Experience in a technical information security role or a cloud devops role with security exposure.