At a Glance
- Tasks: Design and implement automation playbooks for efficient incident response in a Security Operations Centre.
- Company: Join a dynamic team focused on cutting-edge security technology and innovation.
- Benefits: Enjoy remote work flexibility and competitive pay rates, with opportunities for professional growth.
- Why this job: Be part of a mission-driven role that enhances cybersecurity and makes a real impact.
- Qualifications: Bachelor's degree or equivalent experience in Cybersecurity, plus 2-5 years in security operations.
- Other info: Ideal for tech-savvy individuals passionate about automation and security.
The predicted salary is between 72000 - 108000 £ per year.
Duration: 12 months
Pay: £360.26/day PAYE or £495.15/day via umbrella
Location: Remote (UK)
Role Purpose
The SOAR Engineer/Analyst is responsible for designing, developing, implementing, and maintaining automation playbooks to improve incident response efficiency within the Security Operations Centre. This role integrates multiple security tools and workflows, leveraging platforms like Darktrace and CrowdStrike to create cohesive and automated threat detection and response mechanisms.
Key Responsibilities
- Playbook Development: Design, implement, and maintain SOAR playbooks for automated response and alert enrichment.
- Tool Integration: Develop and manage integrations with:
- Google SecOps (Chronicle, Security Command Center)
- Darktrace (Threat Visualizer, Antigena)
- CrowdStrike Falcon (EDR, threat intelligence, APIs)
- Other security platforms such as SIEMs, ticketing systems, and firewalls.
Required Skills & Qualifications
- Bachelor's degree in Computer Science, Cybersecurity, or related discipline, or equivalent hands-on experience.
- 2-5 years of experience in security operations or security engineering.
- Hands-on experience with SOAR platforms (e.g., Cortex XSOAR, Splunk SOAR, IBM Resilient).
- Strong familiarity with:
- Google SecOps/Chronicle
- Darktrace (AI-based threat detection)
- CrowdStrike Falcon platform
Desirable Qualifications
- Experience with CI/CD for playbook development and version control (e.g., Git).
- Familiarity with other SOC tools (e.g., ServiceNow, Jira, Splunk, Elastic, SentinelOne).
- Security certifications such as:
- SOAR-specific certifications (e.g., Cortex XSOAR Certified Engineer)
- CrowdStrike Certified Falcon Responder
- Google Cybersecurity Certificate
- General security certs (e.g., CySA+, GCIH, CISSP)
SOAR Engineer/Analyst (Security Orchestration, Automation, and Response) employer: Gibbs Hybrid
Contact Detail:
Gibbs Hybrid Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOAR Engineer/Analyst (Security Orchestration, Automation, and Response)
✨Tip Number 1
Familiarise yourself with the specific SOAR platforms mentioned in the job description, such as Cortex XSOAR and Splunk SOAR. Having hands-on experience or even completing relevant online courses can give you a significant edge during interviews.
✨Tip Number 2
Network with professionals in the cybersecurity field, especially those working in Security Operations Centres. Engaging in discussions about automation and incident response can provide insights and potentially lead to referrals for the position.
✨Tip Number 3
Stay updated on the latest trends and technologies in security orchestration and automation. Being knowledgeable about recent developments can help you demonstrate your passion and commitment to the field during conversations with our team.
✨Tip Number 4
Prepare to discuss specific examples of how you've implemented automation in previous roles. Highlighting your problem-solving skills and ability to optimise workflows will show us that you're a great fit for the SOAR Engineer/Analyst role.
We think you need these skills to ace SOAR Engineer/Analyst (Security Orchestration, Automation, and Response)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in security operations and automation. Emphasise your hands-on experience with SOAR platforms and scripting skills, as these are crucial for the role.
Craft a Compelling Cover Letter: Write a cover letter that specifically addresses the key responsibilities mentioned in the job description. Explain how your background aligns with the requirements, particularly in playbook development and tool integration.
Showcase Relevant Projects: If you have worked on specific projects involving SOAR platforms or automation in security operations, include these in your application. Detail your role and the impact of your contributions.
Highlight Certifications: List any relevant certifications prominently in your application. Certifications like Cortex XSOAR Certified Engineer or CrowdStrike Certified Falcon Responder can set you apart from other candidates.
How to prepare for a job interview at Gibbs Hybrid
✨Showcase Your Technical Skills
Be prepared to discuss your hands-on experience with SOAR platforms and the specific tools mentioned in the job description, like Darktrace and CrowdStrike. Highlight any relevant projects or playbooks you've developed, as this will demonstrate your capability to fulfil the role.
✨Understand Incident Response Frameworks
Familiarise yourself with incident response frameworks and the MITRE ATT&CK framework. Be ready to explain how you would apply these frameworks in real-world scenarios, as this knowledge is crucial for a SOAR Engineer/Analyst.
✨Prepare for Problem-Solving Questions
Expect questions that assess your problem-solving and critical thinking skills. Think of examples where you've successfully automated processes or improved efficiency in security operations, and be ready to discuss the outcomes.
✨Communicate Clearly and Confidently
Strong communication skills are essential for this role, especially when collaborating with SOC analysts. Practice articulating your thoughts clearly and confidently, as this will help you convey your ideas effectively during the interview.