Job Summary We are seeking a highly skilled Security Delivery Consultant with strong experience in Security Operations Center (SOC) environments, particularly in Incident Response (L2), EDR, NDR, and SIEM operations. The ideal candidate will play a key role in cybersecurity monitoring, incident investigation, threat detection, and response, while contributing to the development and enhancement of SOC processes, tools, and policies.
Key Responsibilities SOC Operations & Incident Response Execute and support incident response activities (L2 level), including detection, analysis,containment, and remediation. Develop and maintain incident response plans, SOC policies, procedures, andplaybooks. Analyze security events and provide actionable guidance to team members. Provide on-call support outside business hours when required. SIEM & Threat Detection Work closely with SIEM engineers to develop, fine-tune, and optimize correlation rules. Monitor and analyze logs and alerts from multiple security tools. Create custom detection use cases and correlation rules. EDR (Endpoint Detection & Response) Administration Deploy, upgrade, and maintain EDR agents across Windows, mac OS, and Linuxenvironments. Monitor agent health and troubleshoot reporting issues. Develop and manage EDR policies and configurations. Integrate EDR solutions with SIEM and other security platforms. NDR (Network Detection & Response) Administration Administer and maintain NDR solutions. Develop and manage NDR policies and configurations. Integrate NDR with SIEM and other cybersecurity tools Security Tools & Vulnerability Management Work with tools such as Tenable (Vulnerability Management). Manage support tickets and coordinate with vendors for issue resolution. Periodically review EDR/NDR configurations and propose improvements. Reporting & Communication Produce cyber intelligence and incident reports for both technical and non-technicalstakeholders. Clearly communicate cybersecurity risks and findings to business users and seniormanagement. Leadership & Coordination Lead and support SOC team activities. Ensure adherence to security standards and best practices. Collaborate with cross-functional teams to strengthen overall security posture
Requirements Minimum 5 years of experience in cybersecurity, preferably in SOC environments. Strong hands-on experience in:Incident Response (IR L2) EDR & NDR technologies SIEM platforms Vulnerability Management (Tenable) Proven experience in security event analysis, threat detection, and incident handling. Strong analytical, organizational, and leadership skills. Excellent written and verbal communication skills.
Preferred Certifications GIAC GCIH (Incident Handler) GIAC GMON (Continuous Monitoring) GIAC GCFA (Forensic Analyst) Or equivalent cybersecurity certifications
Mandatory / Critical Skills (Must-Have) Incident Response (L2) EDR Administration NDR Administration SIEM Operations Tenable / Vulnerability Management