ROLE SUMMARY
The SOC Detection Engineer is responsible for the development of technical aspects and ongoing development of the detection platforms for the Verisure SOC. This includes the Microsoft Sentinel platform and various log sources, tools and technologies feeding into the platform.
The role is part of Verisure Global Security Operations Centre and plays a vital role in keeping our teams sharp against real world threats, and in focussing our security strategy.
PRIMARY ROLE & RESPONSIBILITIES
Primary responsibilities include:
-
Support the development of SOC automations to improve overall SOC efficiency, analytics and response time to security incidents.
-
Development and tuning of SOC use cases / analytics rules to improve threat detection capabilities.
-
Onboarding, tuning and filtering data sources / feed and creation of detection use cases associated with the data sources.
-
Configure SIEM tools to collect, correlate, and analyse security event data from various sources.
-
Conduct regular reviews and updates of use cases to ensure their effectiveness.
-
Create and manage relevant dashboards, workspaces and reports including overall Sentinel costs.
-
Partner with our threat intelligence, hunting and incident detection and response teams.
-
Serve as the SME for the SOC and Microsoft Sentinel.
-
Perform regular tuning of the Sentinel system to minimize false positives and enhance accuracy.
-
Act as the Subject Matter Expert (SME) for Microsoft Defender for Endpoint and enhancing detection capabilities.
-
Maintenance and support of Microsoft Sentinel.
-
Health and Performance monitoring of Microsoft Sentinel and supporting infrastructure.
-
Manage log storage, retention policies, and data integrity.
-
Evaluate data sources value and usage within the SOC
-
Provide mentoring to the team to support the continual technical development of team members.
-
Maintain detailed documentation of Sentinel configurations, rules, and use cases.
-
Utilise and maintain a deep knowledge of the business as well as working relationships with each region.
SECONDARY ROLE
Secondary responsibilities include:
-
Support the evolution of the detection mechanisms used within the SOC e.g. Introduce Jupyter Notebooks for Advanced Threat Hunting and Machine Learning
-
Acting as the secondary point for incident escalation during major incidents if required.
-
Support and future Red Team / Purple Team activities
-
Create the vision and plans to continue to mature Microsoft Sentinel.
-
Manage and support AWS infrastructure and Services that support the SOC operation.
ESSENTIAL SKILLS & EXPERIENCE
Essential skills & experience includes:
-
Extensive experience in Cyber Operations include monitoring, incident response & handling, threat detection and threat intelligence
-
SIEM and general security tooling experience Including Microsoft Sentinel, Microsoft Defender, KQL, AWS, Splunk, Next Generation Firewalls.
-
Extensive knowledge of hacking and threat detection or monitoring techniques
-
Strong written and verbal communication skills with an ability to communicate technical details in a clear and understandable manner in Business English
-
Self-starter, self-motivated, and able to work independently while following the team’s mission and vision in a fast-paced operationally focused environment
-
Process and procedure lifecycle ownership
-
Knowledge of relevant legal obligations & applicable legislation such as GDPR
-
International working experience (global team) - Must be flexible to work with global teams and working on different time zones
-
Mentoring and coaching
DESIRABLE SKILLS & EXPERIENCE
Desirable skills & experience includes:
-
Azure AZ-500 (Azure Security Engineering Associate) / SC-100 (Microsoft Cybersecurity Architect)
-
Microsoft Sentinel / SC-200 (Security Operations Analyst Associate)
-
AWS / AWS Guard Duty
-
Linux/Unix Administration Experience, preferably CentOS/RHEL
-
ITIL certification
-
Industry certification (CISA / CISSP certification/ CREST / SANS/ CISM)
-
Scripting Python/PowerShell/Bash
-
Non-English language skills e.g. Spanish, Swedish
Top Skills
What We Do
Verisure is the leading provider of peace of mind and protection to residential and small business customers across Europe and Latin America. We deliver professionally-monitored security services to over 5.5 million customers in 17 countries across Europe and Latin America, with a team of more than 28,000 colleagues.
Verisure’s brand family includes: Securitas Direct in Spain and Portugal (*), AlertAlarm, Dansikring Direct, Falck Alarms, Mediaveil, TeleAtlantic and NorAlarm to name a few!
Our alarms are the most widely installed home security systems in Europe. A strong focus on quality and service means our customers are among the most satisfied in the industry!
GROWTH
Verisure enjoyed consistent growth over the past 35 years as a result of its highly entrepreneurial and innovative approach to business. We also continue to expand internationally.
- Strong and visionary Management Team and a robust business plan for value creation.
- We are a big company with a start-up mindset, fast, agile and lean, merit based, high-performance and value-driven
INNOVATION
- We continuously invest more in new innovation to provide effective, intelligent and reliable security solutions.
- Offer a breakthrough product & service proposition: identify, research, develop, test & refine advanced security solutions.
- Develop exclusive hardware and software features.
- Research & Development centers in Madrid and Malmö.
- +600 R&D and IT experts… and growing!
PEOPLE
Our successful growth is dependent on our talent pipeline. Our People are our business! We are:
- Passionate in everything we do
- Committed to making a difference
- Always Innovating
- Winning as a Team
- With Trust & Responsibility