Job Openings Security Delivery Consultant 132768

About the job Security Delivery Consultant 132768

Security Delivery Consultant

We are seeking an experienced Cyber Security professional to join our SOC team as a Senior Analyst / SOC Lead. The ideal candidate will lead incident response, manage SOC policies and procedures, and drive security operations across SIEM, EDR, and NDR technologies. This role requires hands-on technical expertise, strong communication skills, and the ability to lead a cyber security team with on-call support after business hours.

Key Responsibilities

  • Incident Response & SOC Policy

    • Develop, maintain, and refine incident response plans, playbooks, and SOC policies, processes, and procedures.
    • Lead incident response activities from detection through containment, eradication, and recovery.
    • Coordinate with IT, legal, risk, and business units during security incidents.
  • SIEM Management

    • Implement, tune, and optimize SIEM solutions; work with SIEM engineers to develop and refine correlation rules.
    • Analyze security events, identify threats, and provide guidance to the security team.
    • Produce cyber intelligence reports for technical staff, non-technical stakeholders, and senior management.
  • IR Tools & Investigations

    • Utilize IR tools and solutions for detection, investigation, and response.
    • Conduct or supervise root-cause analysis and post-incident reviews.
    • Communicate findings and recommendations to various audiences.
  • Communication & Leadership

    • Clearly articulate cyber risk and strategic issues to technical and non-technical audiences.
    • Demonstrate strong analytical and organizational skills; lead the cyber team; provide on-call support after business hours.
  • EDR/NDR Administration

    • Administer and maintain EDR (Endpoint Detection and Response) and NDR (Network Detection and Response) technologies.
    • Deploy, upgrade, and maintain agents across Windows, macOS, and Linux; monitor health and troubleshoot reporting issues.
    • Develop and enforce EDR/NDR policies; integrate with SIEM and other security tools.
    • Create and maintain custom correlation rules for EDR/NDR; review configurations regularly for enhancements.
    • Manage support tickets with EDR/NDR vendors as needed.
  • Collaboration & Problem Solving

    • Work with cross-functional teams to improve security controls, telemetry, and incident response capabilities.
    • Document processes and contribute to a knowledge base for ongoing improvements.

Required Qualifications & Experience

  • Minimum 5 years of hands-on experience in cyber security operations, incident response, and SOC planning.
  • Experience with incident response planning, SOC policy development, and procedure creation.
  • Proficient in Security Information and Event Management (SIEM) operations; ability to develop/refine correlation rules with SIEM engineers.
  • Hands-on experience with EDR and NDR technologies (deployment, policy management, health monitoring, integration with SIEM).
  • Strong ability to analyze security events, perform investigations, and provide actionable guidance.
  • Excellent written and verbal communication skills; ability to convey technical concepts to various audiences.
  • Demonstrated leadership and people-management skills; ability to lead cyber teams and provide after-hours support.
  • Certifications (preferred): GIAC GCIH, GMON, GCFA or similar.

Preferred Skills

  • Experience with cross-domain integrations (e.g., SIEM integrations with ITSM, SOAR, threat intel feeds, firewall/logging systems).
  • Knowledge of network forensics, malware analysis basics, and threat hunting concepts.
  • Familiarity with regulatory/compliance requirements relevant to security operations.

Working Conditions

  • On-call rotations and after-hours support may be required.
  • Office-based with possible on-site presence at client or data center locations.
  • Ability to work in a fast-paced environment and manage multiple priorities.