Назад
Company hidden
9 часов назад

Lead SOC Analyst (iGaming)

Формат работы
remote (Global)
Тип работы
fulltime
Грейд
lead
Английский
b2
Вакансия из списка Hirify.GlobalВакансия из Hirify RU Global, списка компаний с восточно-европейскими корнями
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Lead SOC Analyst (iGaming): Managing complex information security incidents and enhancing SOC analytical capabilities with an accent on in-depth analysis of incidents, attack path reconstruction, and threat hunting. Focus on thinking in terms of incidents and attack chains, identifying affected systems, and predicting attacker's further actions.

Location: Worldwide remote

Company

hirify.global is an international technology company with software development expertise in iGaming, fintech, and martech, offering 9 proprietary products and employing over 2,000 people across 4 offices worldwide.

What you will do

  • Manage complex information security incidents, including APT-like attacks, data exfiltration, and insider threats.
  • Conduct in-depth analysis of incidents, identify initial access vectors, and reconstruct attack paths.
  • Form clear conclusions: what happened, how, when, with what effect, and next steps.
  • Think hypothetically about traces/artifacts and predict attacker’s further actions.
  • Interact with internal teams, supporting decision-making and balancing containment with business impact.
  • Enhance detection logic, contribute to post-incident reviews, and organize tabletop exercises.

Requirements

  • 4-6+ years of experience in SOC / MSSP SOC / Incident Response / DFIR Team, with practical experience investigating and preventing real incidents.
  • Experience as a Lead Security Analyst/Expert and Threat Hunting experience.
  • Deep understanding of attacker TTPs according to MITRE ATT&CK.
  • Expertise in infrastructure services (Email, Kubernetes, AD, Databases, Docker) and operating systems (Windows, Linux).
  • Confident working with Splunk SIEM, Redash, ClickHouse, Wazuh.
  • Ability to write complex search queries and correlate data from multiple sources.

Nice to have

  • Experience in high-risk business environments.
  • Participation in Red Team / Purple Team exercises.
  • Scripting and automation skills: Python, Bash, SPL, SQL.
  • Security certifications: GCIA, GCED, GCIH, Splunk Power User, OSCP, CEH.

Culture & Benefits

  • Comprehensive Mental Health Programme.
  • Private insurance (depending on contract type).
  • Paid gym memberships and free English lessons (online).
  • +1 day off per calendar year and referral program rewards.
  • Upskilling, internal workshops, and participation in professional conferences.
  • Flexible work options including on-site, hybrid, and remote teams.

Будьте осторожны: если вас просят войти в iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →