At a Glance
- Tasks: Monitor and respond to security incidents while developing detection rules and automation scripts.
- Company: Join a leading tech firm focused on cybersecurity innovation.
- Benefits: Attractive salary, health perks, flexible work options, and growth opportunities.
- Why this job: Make a real difference in protecting digital environments and enhancing security measures.
- Qualifications: Bachelor's degree in Cybersecurity or related field with extensive experience in security operations.
- Other info: Collaborative culture with opportunities to work on cutting-edge security technologies.
The predicted salary is between 48000 - 72000 £ per year.
Responsibilities
- Monitor, analyze, and respond to security events and incidents using SIEM and other security tools.
- Develop and maintain detection rules, playbooks, and automation scripts to improve incident response efficiency.
- Perform threat hunting and forensic investigations across IT environment.
- Collaborate with infrastructure and application teams to ensure secure configurations and compliance.
- Maintain and improve endpoint protection, intrusion detection/prevention systems.
- Document incident response procedures and contribute to post‑incident reviews.
- Create network diagrams and as‑built documents.
- Develop and maintain a strong partnership with relevant global businesses and technical leaders and teams, including 3rd parties and affiliate businesses.
- Stay current with emerging threats, vulnerabilities, and security technologies.
Education & Experience
- Bachelor's Degree in MIS, CIS, Cybersecurity or similar.
- At least five years of Security Operations.
- At least three years of Linux Administration.
- At least two years of Cloud (AWS or Azure) Administration.
Must‑Have Skills
- Linux and Windows OS.
- DNS.
- Certificate Management: Digicert, AppViewX.
- Experience with ticket management solutions: Dynamics 365, ServiceNow, Remedy, etc.
- Experience with PMO tools such as Jira, Smartsheet, Monday.com, etc.
- SIEM and SOAR technologies (Splunk, Cribl, Azure Sentinel).
- Configure and troubleshoot EDR/ Microsoft Defender for Endpoint, vulnerability management, and threat detection systems, with focus on Linux OS.
- Azure Security Center and Office 365 Compliance Portal.
- AWS and Azure (IAM, IaaS, PaaS).
- Knowledge in KQL queries in Sentinel and/or SPL in Splunk for developing use cases, dashboards, custom rules, custom parsers.
- Intermediate understanding of services and protocols commonly used in hosting environments: web servers, database servers, active directory protocols.
- Understanding of network packet analysis using tools such as Wireshark and TCPDump.
- Collaboration and communication skills across multiple teams and businesses.
Good‑to‑Have Skills
- Relevant certifications such as AWS Security Specialty, CISA, CISM, GIAC, Security+, or CISSP.
- Palo Alto Cortex suite of tools.
- Network technologies: switching, routing, wireless.
- PowerShell and Python Scripting.
- Power BI and Power Automate.
- Integrating security systems via API, etc.
Security Operations Engineer employer: Cantor Fitzgerald
Contact Detail:
Cantor Fitzgerald Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Operations Engineer
✨Tip Number 1
Network, network, network! Get out there and connect with professionals in the security field. Attend meetups, webinars, or even local events. You never know who might have a lead on your dream job!
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your projects, especially those involving SIEM tools or threat hunting. This gives potential employers a taste of what you can do and sets you apart from the crowd.
✨Tip Number 3
Don’t just apply blindly! Tailor your approach for each role. Research the company’s security posture and mention how your experience with Linux and cloud administration can help them improve their incident response.
✨Tip Number 4
Keep learning! Stay updated on the latest security trends and technologies. Join forums or online courses to enhance your skills. This not only boosts your confidence but also shows employers that you’re committed to growth.
We think you need these skills to ace Security Operations Engineer
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Security Operations Engineer role. Highlight your experience with SIEM tools, Linux, and cloud administration. We want to see how your skills match up with what we're looking for!
Show Off Your Skills: In your cover letter, don’t just list your qualifications—show us how you've used them in real situations. Talk about specific incidents where you monitored or responded to security events. We love a good story!
Be Clear and Concise: Keep your application clear and to the point. Use bullet points for your achievements and responsibilities. We appreciate straightforward communication, especially when it comes to complex topics like security!
Apply Through Our Website: Make sure to apply through our website! It’s the best way for us to keep track of your application and ensure it gets the attention it deserves. Plus, it’s super easy to do!
How to prepare for a job interview at Cantor Fitzgerald
✨Know Your Tools
Familiarise yourself with the specific SIEM and SOAR technologies mentioned in the job description, like Splunk and Azure Sentinel. Be ready to discuss how you've used these tools in past roles, including any detection rules or automation scripts you've developed.
✨Showcase Your Collaboration Skills
Since this role involves working with various teams, prepare examples of how you've successfully collaborated with infrastructure and application teams in the past. Highlight any experiences where you ensured secure configurations and compliance.
✨Stay Current on Threats
Demonstrate your knowledge of emerging threats and vulnerabilities by discussing recent incidents or trends in cybersecurity. This shows that you're proactive and committed to staying informed in a rapidly changing field.
✨Prepare for Technical Questions
Expect technical questions related to Linux and Windows OS, as well as cloud administration. Brush up on your knowledge of DNS, EDR systems, and network packet analysis tools like Wireshark. Being able to articulate your understanding will set you apart.