At a Glance
- Tasks: Enhance security posture using Google Chronicle and implement UEBA/SOAR solutions.
- Company: Leading financial services firm focused on security innovation.
- Benefits: Competitive pay, hybrid work model, and potential for contract extension.
- Other info: Opportunity for growth in a dynamic, regulated industry.
- Why this job: Join a cutting-edge team and make a real impact in cybersecurity.
- Qualifications: Experience with Google SecOps, SIEM tools, and strong SOC background required.
The predicted salary is between 48000 - 72000 £ per year.
Key Responsibilities
- Enable and validate UEBA alerting within Chronicle SIEM, based on log sources
- Deliver a minimum viable UEBA capability with tested detection logic
- Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity
- Demonstrate the ability to work with Google Chronicle and SecOps APIs, specifically for the purpose of updating and managing reference data
- Conduct current state assessment of detection engineering capabilities and log source coverage
- Design and implement detection use cases aligned to MITRE ATT&CK framework
- Enable SOAR integration by identifying high-fidelity detections and mapping
Key Technical / IT Security Skills
- Chronicle SIEM
- Google SecOps
- UEBA Tooling
- Windows Event Logs
- BindPlane
- MITRE ATT&CK
- Strong SOC background
- SOAR playbooks
- GCP
Finer Details
- Outside IR35
- Contract until End of December, possibly longer
- Hybrid, 4 times a month in the London office
Please apply for consideration
#J-18808-Ljbffr
Google SecOps Engineer (SOAR/UEBA) - Outside IR35 employer: SF Recruitment
Contact Detail:
SF Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Google SecOps Engineer (SOAR/UEBA) - Outside IR35
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, especially those who work with Google SecOps or in financial services. Attend meetups or webinars to make connections and get your name out there.
✨Tip Number 2
Show off your skills! Create a portfolio or a GitHub repository showcasing your projects related to SIEM tools, UEBA, or SOAR. This gives potential employers a tangible look at what you can do.
✨Tip Number 3
Prepare for interviews by brushing up on the MITRE ATT&CK framework and Google Chronicle specifics. Be ready to discuss how you've tackled similar challenges in past roles—real-world examples go a long way!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, we love seeing candidates who are proactive about their job search.
We think you need these skills to ace Google SecOps Engineer (SOAR/UEBA) - Outside IR35
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with Google SecOps and SIEM tools like Chronicle. We want to see how your skills align with the job description, so don’t be shy about showcasing your relevant projects!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re the perfect fit for this role. Mention your experience with UEBA and SOAR, and how you can contribute to enhancing security posture in a regulated environment.
Showcase Your Technical Skills: Be specific about your technical skills in your application. Highlight your familiarity with MITRE ATT&CK, detection engineering, and any experience you have with GCP. We love seeing candidates who can hit the ground running!
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to keep track of your application and ensure it gets the attention it deserves. Plus, it shows you’re serious about joining our team!
How to prepare for a job interview at SF Recruitment
✨Know Your Tools Inside Out
Make sure you’re well-versed in Google Chronicle and the relevant SIEM tools. Brush up on how to enable and validate UEBA alerting, as well as your experience with SOAR playbooks. Being able to discuss specific use cases or challenges you've faced will show your expertise.
✨Understand the MITRE ATT&CK Framework
Familiarise yourself with the MITRE ATT&CK framework and be ready to discuss how you’ve designed detection use cases aligned to it. This will demonstrate your understanding of threat detection and your ability to apply it in real-world scenarios.
✨Showcase Your SOC Experience
Highlight your strong background in Security Operations Centres (SOC). Be prepared to share examples of how you’ve contributed to detection engineering capabilities and log source coverage. This will help the interviewer see your practical experience in action.
✨Prepare for Technical Questions
Expect technical questions related to GCP, Windows Event Logs, and SecOps APIs. Practise explaining complex concepts in simple terms, as this will showcase your communication skills and ability to work collaboratively within a team.