At a Glance
- Tasks: Design and implement security solutions using Google Chronicle and UEBA tools.
- Company: Join a leading financial services client focused on enhancing security posture.
- Benefits: Competitive contract rate, hybrid work model, and potential for extension.
- Why this job: Make a real impact in security operations while working with cutting-edge technology.
- Qualifications: Experience with Google SecOps, SIEM tools, and strong SOC background required.
- Other info: Opportunity to grow your skills in a dynamic, regulated industry.
The predicted salary is between 36000 - 60000 £ per year.
I am currently assisting a client who operate in a regulated industry, financial services, who are currently embarking a programme of work focused on maturity/designing and implementing security posture utilising SIEM tools such as Google Chronicle & implementing UEBA/SOAR (Security Orchestration, Automation, and Response / User and Entity Behaviour Analytics) built on GCP/Google Cloud so Google SecOps/Security Operations experience is highly desirable.
Key Responsibilities;
– Enable and validate UEBA alerting within Chronicle SIEM, based on log sources
– Deliver a minimum viable UEBA capability with tested detection logic
– Provide engineering support to accelerate onboarding of log sources required for UEBA enrichment and detection fidelity
– Demonstrate the ability to work with Google Chronicle and SecOps APIs, specifically for the purpose of updating and managing reference data
– Conduct current state assessment of detection engineering capabilities and log source coverage
– Design and implement detection use cases aligned to MITRE ATT&CK framework
– Enable SOAR integration by identifying high-fidelity detections and mapping
Key Technical / IT Security Skills;
– Chronicle SIEM
– Google SecOps
– UEBA Tooling
– Windows Event Logs
– BindPlane
– MITRE ATT&CK
– Strong SOC background
– SOAR playbooks
– GCP
Finer Details;
– Outside IR35
– Contract until End of December, possibly longer
– Hybrid, 4 times a month in the London office
Please apply for consideration
Google SecOps Engineer (SOAR/UEBA) employer: SF Technology Solutions
Contact Detail:
SF Technology Solutions Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Google SecOps Engineer (SOAR/UEBA)
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, especially those who work with Google SecOps or SIEM tools. Attend meetups or webinars to connect with potential employers and get your name out there.
✨Tip Number 2
Show off your skills! Create a portfolio or a GitHub repository showcasing your projects related to UEBA/SOAR. This gives you a chance to demonstrate your expertise and makes you stand out from the crowd.
✨Tip Number 3
Prepare for interviews by brushing up on the MITRE ATT&CK framework and Google Chronicle specifics. We want you to be ready to discuss how you've tackled similar challenges in the past and how you can bring value to the team.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, we love seeing candidates who are proactive about their job search.
We think you need these skills to ace Google SecOps Engineer (SOAR/UEBA)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with Google SecOps and SIEM tools like Chronicle. We want to see how your skills align with the job description, so don’t be shy about showcasing relevant projects or achievements!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re the perfect fit for this role. Mention your experience with UEBA/SOAR and how you can contribute to enhancing security posture in a regulated environment.
Showcase Your Technical Skills: Be specific about your technical skills related to the role. If you've worked with MITRE ATT&CK or have experience in detection engineering, let us know! We love seeing concrete examples of how you've used these skills in past roles.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it makes the process smoother for everyone involved!
How to prepare for a job interview at SF Technology Solutions
✨Know Your Tools Inside Out
Make sure you’re well-versed in Google Chronicle and the relevant SIEM tools. Familiarise yourself with their functionalities, especially around UEBA and SOAR. Being able to discuss specific features and how you've used them in past roles will show your expertise.
✨Understand the MITRE ATT&CK Framework
Brush up on the MITRE ATT&CK framework and be ready to discuss how it applies to detection use cases. Prepare examples of how you've designed or implemented detection logic that aligns with this framework in previous positions.
✨Demonstrate Your SOC Experience
Highlight your strong background in Security Operations Centres (SOC). Be prepared to share specific scenarios where you’ve successfully managed alerts, conducted assessments, or improved detection capabilities. Real-world examples will make your experience stand out.
✨Ask Insightful Questions
Prepare thoughtful questions about the company’s current security posture and future plans. This shows your genuine interest in the role and helps you gauge if the company is the right fit for you. Think about asking how they measure the success of their UEBA capabilities.