At a Glance
- Tasks: Join our SOC team to enhance security and respond to incidents effectively.
- Company: Be part of a dynamic firm dedicated to protecting its digital landscape.
- Benefits: Enjoy a collaborative environment with opportunities for growth and learning.
- Why this job: Make a real impact in cybersecurity while developing your skills in a supportive team.
- Qualifications: 8+ years in info security, strong SOC engineering, and incident response experience required.
- Other info: Ideal for those passionate about tech and eager to tackle security challenges.
The predicted salary is between 48000 - 84000 £ per year.
Reporting to the Security Operations Center (SOC) Senior Manager, this person will work alongside an expanding team of information security professionals with the shared goal of protecting the Firm’s security posture and staying one step ahead of threat actors. The person in this role will develop and integrate an Incident Response (IR)/SOC security infrastructure to monitor the Firm’s on prem and cloud environments, articulate technical security requirements, monitor the effectiveness of the IR/SOC, make recommendations for enhancements, and help raise the level of security awareness.
The Senior IR-SOC Engineer serves as a critical bridge between operations and engineering. This very skilled professional has developed additional experience integrating SOC systems, people, and process. This role includes implementation, maintenance and configuration of key SOC technology initiatives.
Responsibilities/Duties
-
Drive and improve continuous monitoring and incident response, serving as a senior resource in our SOC and Incident Response processes.
-
Configure and integrate platforms, tools, service providers, and solutions into our IR/SOC systems, make recommendations as needed.
-
Consolidate and improve security logging and monitoring solutions on premise and in the cloud to detect and respond to security threats in real time.
-
Drive and guide efforts to automate and accelerate the detection and response processes
-
Coach and mentor SOC Analysts on process, tools, and skills development.
-
Partner with Security Engineers to assess and select appropriate security controls and technologies related to continuous monitoring and incident response.
-
Ensure integration of input from the Firm’s deployed suite of security tools to SOC systems (e.g. SIEM/SOAR), including, but not limited to, IDS/IPS, End Point Protection, MDR/XDR, PAM, MFA, DNS Security, and cloud security posture management.
-
Ensure the Firms Incident Response and security monitoring systems adhere to security best practices and baselines to ensure a secure configuration of platforms and resources.
-
Advise and work closely with the Identity and Access Management (IAM) team to ensure IR/SOC visibility into authentication to the Firm’s resources.
-
Participate in the computer security incident response team efforts and other security investigation activities as assigned, including on call escalation rotation.
-
Assist leadership with trend analysis, reporting, and metrics development to drive continuous improvement.
-
Lead tactical and strategic level efforts to develop process and runbooks as well as capture lessons learned and improve tools and process.
-
Provide technical assistance to IT staff in the detection and resolution of security problems.
-
Coordinate multiple projects concurrently and influence the decision making process.
-
Communicate and report issues, status, and results to senior management.
-
Perform other duties as assigned.
Physical demands:
-
Sedentary work: Exerting up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally and all other sedentary criteria are met.
-
Sitting: Remaining in the seated position, particularly for sustained periods of time
-
Walking: Moving about on foot to accomplish tasks, particularly for long distances or moving from one work site to another
-
Lifting: Raising objects from a lower to a higher position or moving objects horizontally
-
Carrying: Transporting an object, usually holding it in the hands or arms, or on the shoulder
-
Pulling/Pushing: Using upper extremities to exert steady force upon an object so that the object moves toward or away from the force
-
Bending/Stooping/Kneeling/Crouching: Bending body downward and forward by bending legs and spine, or by bending legs at knees
-
Reaching: Extending hand(s) and arm(s) in any direction
-
8+ years of hands-on experience in information security related responsibilities with a strong focus on SOC engineering, incident response, and thread detection/hunting
-
In-depth knowledge of IR/SOC monitoring, alerting and investigation tools platforms, process, and architecture.
-
Experience working with cloud security technologies (AWS, Azure DevOps, Kubernetes, GCP, etc) including cloud log analysis, monitoring, detection, and incident response.
-
Experience with SOC use of SIEM, SOAR, IDS/IPS, DLP, and Endpoint security
-
Experience with third-party security monitoring solutions and providers
-
Ability to effectively prioritize and execute tasks
-
Ability to effectively present information verbally and in writing
-
Must be able to work collaboratively in a team environment and independently
-
Ability to handle sensitive and/or confidential material and information with suitable discretion
-
Excellent interpersonal skills and a professional demeanor; ability to work effectively with all levels of Firm personnel and vendors
Required Education
Required:
- Bachelor’s (or Master’s) degree in information security, IT, related discipline, or equivalent experience
Preferred:
- Professional certifications such as GIAC Certified Incident Handler (GCIH); GIAC Certified Intrusion Analyst (GCIA); Certified Information Systems Security Professional (CISSP)
IR-SOC Engineer employer: Simpson Thacher & Bartlett LLP
Contact Detail:
Simpson Thacher & Bartlett LLP Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land IR-SOC Engineer
✨Tip Number 1
Familiarize yourself with the specific tools and technologies mentioned in the job description, such as SIEM, SOAR, and cloud security platforms like AWS and Azure. Having hands-on experience or relevant projects to discuss can set you apart during the interview.
✨Tip Number 2
Highlight your experience in incident response and threat detection by preparing examples of past challenges you've faced and how you overcame them. This will demonstrate your problem-solving skills and ability to handle real-world security issues.
✨Tip Number 3
Showcase your ability to work collaboratively by discussing any previous experiences where you mentored others or worked closely with cross-functional teams. This aligns well with the role's emphasis on coaching SOC Analysts and partnering with Security Engineers.
✨Tip Number 4
Stay updated on the latest trends and best practices in information security, particularly in SOC operations and incident response. Being knowledgeable about current threats and solutions will help you engage in meaningful discussions during the interview.
We think you need these skills to ace IR-SOC Engineer
Some tips for your application 🫡
Tailor Your Resume: Make sure to customize your resume to highlight your 8+ years of experience in information security, particularly focusing on SOC engineering and incident response. Use specific keywords from the job description to demonstrate your fit for the role.
Craft a Strong Cover Letter: In your cover letter, emphasize your hands-on experience with cloud security technologies and your ability to integrate SOC systems. Mention any relevant certifications you hold, such as GCIH or CISSP, to strengthen your application.
Showcase Technical Skills: Clearly outline your technical skills related to IR/SOC monitoring tools, cloud log analysis, and incident response processes. Provide examples of how you've successfully implemented or improved security measures in previous roles.
Highlight Team Collaboration: Since this role requires collaboration with various teams, include examples of how you've worked effectively in team environments. Discuss any mentoring or coaching experiences you've had with SOC analysts or other team members.
How to prepare for a job interview at Simpson Thacher & Bartlett LLP
✨Showcase Your Technical Expertise
Be prepared to discuss your hands-on experience with SOC engineering and incident response. Highlight specific tools and technologies you've worked with, such as SIEM, SOAR, and cloud security platforms like AWS or Azure.
✨Demonstrate Problem-Solving Skills
Expect scenario-based questions that assess your ability to handle security incidents. Use the STAR method (Situation, Task, Action, Result) to structure your responses and showcase your analytical thinking.
✨Emphasize Collaboration and Mentorship
Since this role involves coaching SOC Analysts, be ready to share examples of how you've mentored others in the past. Discuss your approach to teamwork and how you foster a collaborative environment.
✨Prepare for Behavioral Questions
The interviewers will likely ask about your interpersonal skills and how you handle sensitive information. Reflect on past experiences where you successfully navigated challenging situations and maintained professionalism.