At a Glance
- Tasks: Lead incident response efforts and manage security incidents using Azure Security Solutions.
- Company: Nadara is a forward-thinking renewable energy company committed to community development and environmental initiatives.
- Benefits: Enjoy a stimulating international environment with growth opportunities and a people-centric approach.
- Why this job: Join a passionate team, tackle challenging problems, and make a real impact in cybersecurity.
- Qualifications: Master's/Bachelor's in cybersecurity or computer science with 3+ years as a SOC analyst required.
- Other info: Fluent English and effective communication skills are essential; remote work options available.
The predicted salary is between 36000 - 60000 £ per year.
Nadara is an innovative place to work. We work in a stimulating and challenging environment, where every day we explore the unknown with curiosity, make decisions with quality and take action and deliver with courage. For us, diversity is a real value, and we encourage connecting different perspectives with respect.
Job Description Summary
The Security Incident Specialist is responsible for ensuring robust incident management by investigating and addressing security incidents reported by or assigned to the SOC. This role involves leading incident response efforts, escalating issues to designated owners when necessary, and coordinating the implementation of Azure Security Solutions, including Azure DLP, Defender, and Defender for Cloud. Additionally, the specialist will support the development and refinement of policies and procedures to enhance Security Incident Management and Cybersecurity practices.
Responsibilities
- Demonstrating familiarity with Microsoft Security Solutions (Defender, Sentinel, Azure, Entra, etc.).
- Implementing Azure Security Solutions to strengthen the organization's security posture and optimize incident handling processes.
- Maintaining and developing the company's security monitoring systems and ensuring efficient SIEM ingestion (Sentinel).
- Ensuring the proper collection of logs, alerts, and incidents for effective monitoring and response.
- Reviewing and developing analytics and playbooks for incident classification, assignment, and response automation.
- Reporting the status and outcomes of incidents and investigations to company stakeholders.
- Writing clear and comprehensive incident reports, combining logs and evidence, tailored for both C-level executives and technical teams.
- Coordinating the Incident Management process with Vulnerability Management to ensure cohesive security operations.
- Supporting initiatives to enhance secure architectures, reducing the potential threat landscape.
- Aligning the Incident Management process with organizational policies, procedures, and security guidelines.
Key Requirements
- Master/Bachelor Degree in cybersecurity or computer science and 3+ years as SOC analyst, or undergraduate and 5+ years as SOC analyst.
- Excellent practice in:
- SIEM/SOAR (Sentinel) maintenance and development
- Log collection, analysis, and correlation
- Incident investigations and response
- Malware analysis
- Phishing analysis
- File system checks and memory dump
- Ioc editing and searching
- Evidence acquisition and retention
- Secops scripting (bash, vbscript, Powershell, Python)
- Threat intelligence and OSINT
- Supporting cybersecurity policies and procedures, especially Security Incident Management
Desirable Certifications
- Blue Team Level 1 (BTL1), Blue Team Level 2 (BTL2), eCTHP, eCIR, GCIH, SC-200, AZ-500, AZ-900, Certified CyberDefender (CCD), or similar.
What We Offer
- An international, stimulating environment.
- A people-centric approach.
- Challenging challenges and growth opportunities.
- A passionate team environment.
Security Incident Specialist employer: Nadara
Contact Detail:
Nadara Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Incident Specialist
✨Tip Number 1
Familiarise yourself with Microsoft Security Solutions, especially Azure Defender and Sentinel. Understanding these tools will not only help you in the interview but also demonstrate your proactive approach to the role.
✨Tip Number 2
Engage with online communities or forums focused on cybersecurity and incident management. Networking with professionals in the field can provide insights into current trends and challenges, which you can discuss during your interview.
✨Tip Number 3
Prepare to showcase your incident response experience by discussing specific scenarios where you've successfully managed security incidents. This will highlight your practical knowledge and problem-solving skills.
✨Tip Number 4
Stay updated on the latest cybersecurity threats and trends. Being knowledgeable about recent incidents and how they were handled can set you apart as a candidate who is genuinely invested in the field.
We think you need these skills to ace Security Incident Specialist
Some tips for your application 🫡
Understand the Role: Before applying, make sure to thoroughly read the job description for the Security Incident Specialist role. Understand the key responsibilities and requirements, especially the familiarity with Microsoft Security Solutions and incident management processes.
Tailor Your CV: Customise your CV to highlight relevant experience in cybersecurity, particularly your work as a SOC analyst. Emphasise your skills in SIEM/SOAR maintenance, incident investigations, and any certifications you hold that align with the job requirements.
Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cybersecurity and your understanding of Nadara's mission. Mention specific experiences where you've successfully managed security incidents or implemented security solutions, demonstrating your fit for the role.
Proofread Your Application: Before submitting, carefully proofread your CV and cover letter for any spelling or grammatical errors. Ensure that your documents are clear, concise, and professional, as this reflects your attention to detail and communication skills.
How to prepare for a job interview at Nadara
✨Showcase Your Technical Skills
Make sure to highlight your familiarity with Microsoft Security Solutions, especially Azure tools like Defender and Sentinel. Be prepared to discuss specific experiences where you've implemented these solutions in past roles.
✨Demonstrate Incident Management Experience
Prepare examples of how you've handled security incidents in the past. Discuss your approach to incident response, including any challenges you faced and how you overcame them.
✨Communicate Clearly
Since you'll be reporting to both technical teams and C-level executives, practice explaining complex security concepts in simple terms. This will show your ability to tailor your communication style to different audiences.
✨Emphasise Your Curiosity
Nadara values a curious mindset. Be ready to share instances where your curiosity led you to discover threats or improve security processes. This will demonstrate that you're proactive and engaged in your work.