Security Operations Center (SOC) Engineer
il y a 2 jours
Baltimore
Job DescriptionDescription: Equal Employment Opportunity Statement Klik Solutions is an equal opportunity employer and complies with all applicable federal, state, and local laws prohibiting discrimination in employment. In all hiring and employment practices, Klik Solutions does not discriminate against any employee or applicant based on race, color, religion, sex, sexual orientation, gender identity, gender expression, age, national origin, citizenship status, disability, genetic information, marital status, veteran status, or any other protected characteristic under applicable law. Reasonable Accommodation Policy Consistent with the Americans with Disabilities Act (ADA), Klik Solutions is committed to providing reasonable accommodations to qualified applicants and employees with disabilities. If you need assistance or accommodation due to a disability, please contact . All requests for reasonable accommodation will be evaluated on a case-by-case basis in accordance with applicable laws. About Klik Solutions Klik Solutions has evolved far beyond its origins as a Managed Services Provider (MSP). Today, we are a comprehensive technology solutions provider offering a broad spectrum of services, including digital marketing, data services, software and application development and integration, compliance, security solutions, and cloud expertise. We partner with our clients to provide end-to-end technology solutions, helping them thrive in the digital era through robust IT structures, strategic digital marketing, data-driven insights, regulatory compliance, security measures, and seamless software and application integration. Position Overview The Security Operations Center (SOC) Engineer serves as a frontline defender protecting Klik Solutions and our clients from cyber threats, security vulnerabilities, and malicious actors. This role combines proactive security monitoring and threat detection with ensuring compliance requirements are met across our organization and client environments. The SOC Engineer reports directly to the SOC Lead and will play a crucial role in building and maturing our security operations capabilities across the United States and Ukraine. Role and Responsibilities Security Monitoring & Threat Detection • Monitor security events and alerts across enterprise infrastructure, cloud environments, and client networks 24/7, • Identify, analyze, and triage security incidents using SIEM platforms, EDR/XDR tools, and other security monitoring solutions, • Perform real-time analysis of security logs, network traffic, and endpoint telemetry to detect malicious activity, • Respond to security incidents following established incident response procedures and playbooks, • Conduct a forensic analysis of security events to determine the root cause, scope, and impact, • Document security incidents thoroughly, including attack vectors, affected systems, and remediation actions, • Escalate critical security incidents to senior analysts and management as appropriate, • Monitor and enforce security controls required by compliance frameworks (SOC 2, ISO 27001, HIPAA, PCI-DSS, NIST, etc.), • Assist in maintaining a continuous compliance posture across Klik Solutions and client environments, • Support internal and external security audits by providing evidence, logs, and documentation, • Track and remediate security control gaps identified through compliance assessments, • Generate compliance reports demonstrating adherence to security policies and regulatory requirements, • Work closely with the compliance team to translate regulatory requirements into operational security controls, • Lead or support security onboarding for new client engagements and projects, • Conduct initial security assessments of new client environments to identify risks and gaps, • Deploy and configure security monitoring tools (SIEM agents, EDR, log collectors) in client environments, • Establish baseline security monitoring coverage and alert tuning for new clients, • Document client-specific security requirements, constraints, and escalation procedures, • Create customized security monitoring use cases based on client infrastructure and risk profile, • Coordinate with technical teams during client onboarding to ensure security tooling is properly integrated, • Identify security vulnerabilities across enterprise assets, including endpoints, servers, network devices, and cloud infrastructure, • Assist in vulnerability assessment and penetration testing initiatives, • Collaborate with IT teams to ensure timely patching and remediation of identified vulnerabilities, • Maintain awareness of emerging threats, attack techniques, and vulnerability disclosures, • Contribute to the development and refinement of security monitoring use cases and detection rules, • Assist in tuning security tools to reduce false positives while maintaining detection effectiveness, • Help develop and maintain security incident response playbooks and standard operating procedures, • Support the implementation of security automation and orchestration workflows, • Collect, analyze, and operationalize threat intelligence from internal and external sources, • Track threat actor tactics, techniques, and procedures (TTPs) using frameworks like MITRE ATT&CK, • Share threat intelligence with stakeholders and contribute to threat intelligence sharing communities, • Maintain threat actor profiles and indicators of compromise (IOCs) in security platforms, • Manage and maintain security operations tools, including SIEM, EDR, IDS/IPS, and threat intelligence platforms, • Ensure comprehensive log collection and retention from all critical security-relevant sources to meet compliance requirements, • Work with engineering teams to deploy and configure security sensors and monitoring agents, • Evaluate new security technologies and recommend improvements to the security stack, • Coordinate with the SOC Lead on follow-the-sun operations and shift handoffs, • Partner with IT operations, compliance, privacy, and application security teams on security initiatives, • Communicate security risks and incidents clearly to both technical and non-technical stakeholders, • Engage with external partners, including law enforcement, ISACs, threat intelligence vendors, and security researchers, • Support client communications during security incidents and provide status updates on security posture, • Minimum 2 years of hands-on experience in a security operations center or similar security-focused role, • Proven experience with security monitoring, incident detection, and response activities, • Direct experience working with SIEM platforms (Splunk, Sentinel, QRadar, or similar), • Demonstrated ability to analyze security logs and identify malicious activity, • Deep expertise in at least two of the following domains:, • Intrusion detection and security monitoring, • Security incident response and digital forensics, • Threat intelligence analysis and threat hunting, • Endpoint security (EDR/XDR platforms), • Network security monitoring and analysis, • Security compliance and audit support, • Strong understanding of common attack vectors, malware families, and adversary techniques, • Proficiency with security tools such as IDS/IPS, EDR, SIEM, vulnerability scanners, and packet analyzers, • Working knowledge of operating systems security (Windows, Linux, macOS), • Understanding of network protocols, traffic analysis, and network security architecture, • Working understanding of major compliance frameworks (SOC 2, ISO 27001, HIPAA, PCI-DSS, NIST CSF), • Ability to map security controls to compliance requirements, • Experience with audit evidence collection and documentation, • Understanding of log retention requirements for various compliance standards, • Solid grasp of the cybersecurity threat landscape, attack frameworks (MITRE ATT&CK), and kill chain methodology, • Understanding of security compliance frameworks and how to operationalize them, • Knowledge of security best practices for hardening systems and applications, • Awareness of privacy regulations (GDPR, CCPA) and their intersection with security operations, • Security certifications such as Security+, CySA+, GCIA, GCIH, CEH, CISSP, or compliance-related certifications (CISA, CISM, ISO 27001 Lead Auditor), • Experience with red teaming, penetration testing, or offensive security operations, • Scripting or programming skills (Python, PowerShell, Bash) for security automation, • Experience with SOAR platforms, malware analysis, or reverse engineering, • Prior experience building or maturing security operations capabilities in MSP or MSSP environments, • Project management experience with security implementations and client onboarding