Search Jobvertise Jobs
Jobvertise

IT Security Specialist - SOC (Hybrid)
Location:
US-TX-Houston
Jobcode:
21702
Email this job to a friend

Report this Job

Report this job





Incorrect company
Incorrect location
Job is expired
Job may be a scam
Other







Apply Online
or email this job to apply later

IT Security Specialist - SOC (Hybrid)

We have an immediate need for an IT Security Specialist - SOC to join a global oil exploration and production company. The IT Security Specialist is an experienced and dynamic individual who will serve as the lead for the organization’s Security Operations Center (SOC) function.

Location: Houston, Texas (Hybrid)

This job expects to pay around $135,000 – 140,000 annually.

What You Will Do:


  • Contribute to cybersecurity vision, roadmap, and execution plan
  • Lead and mature the enterprise incident response process including updating the plan, documenting playbooks, facilitating cyber drills, coordinating with Incident Response vendors, setting up alternate communication channels, implementing automation in IR process to reduce response time, etc.
  • Respond immediately to any security-related incidents (e.g., data breaches, viruses, phishing scams) and perform/lead cyber incident triage, including determining scope, urgency, potential impact, and materiality, identifying the specific vulnerability, and making recommendations that enable expeditious remediation
  • Oversee the day-to-day operational support of the SOC, including leading the weekly SOC Incident review meetings, handling and prioritizing help desk tickets, incidents, and cases
  • Oversee On-Call support capability and provide On-Call support ensuring timely response in remediating critical incidents after hours and weekends

What Gets You The Job: 


  • Bachelor’s degree in cyber security, Computer Science, or a related Information Technology field
  • Minimum 5 years’ experience in cyber security with 2 years’ experience in working in a Security Operations Center (SOC)
  • Hands-on experience investigating (potential) security incidents including analyzing high volumes of logs, network data and other attack artifacts
  • Hands-on experience documenting Incident Response plans, playbooks and SOPs in line with security best practice standards such as NIST, SANS, etc.
  • Knowledge of incident categories, incident responses, and timelines for responses
  • Knowledge of security best practice standards such as NIST CSF, NIST 800-53, ISO 27001, etc.
  • CISSP, GCIH or GCFA certification
  • Familiarity with a standardized incident response framework (SANS/NIST)
  • Knowledge of different classes of attacks (e.g., passive, active, insider, distribution attacks)
  • Knowledge of cyberattack vectors and stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, etc.)
  • Knowledge of penetration testing principles, tools, and techniques

Irvine Technology Corporation (ITC) is a leading provider of technology and staffing solutions for IT, Security, Engineering, and Interactive Design disciplines servicing startups to enterprise clients, nationally. We pride ourselves in the ability to introduce you to our intimate network of business and technology leaders – bringing you opportunity coupled with personal growth, and professional development!  Join us. Let us catapult your career!

Irvine Technology Corporation provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Irvine Technology Corporation complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.

Arnold Melgar
Irvine Technology Corporation
Phone: 866.322.4482

Apply Online
or email this job to apply later


 
Search millions of jobs

Jobseekers
Employers
Company

Jobs by Title | Resumes by Title | Top Job Searches
Privacy | Terms of Use


* Free services are subject to limitations