https://bayt.page.link/YL9mrSLV1AakhZ4D9
Create a job alert for similar positions

Job Description

Job Overview:


As a Principal SOC Analyst specializing in SIEM Engineering, your mission will be to safeguard our organization's information systems with a strong focus on threat detection and compliance with healthcare regulations. Your primary responsibilities will involve designing, implementing, and maintaining SIEM solutions to monitor, detect, and respond to security events. You will work closely with the SOC team to manage security incidents, ensure compliance with healthcare standards, and protect our cloud infrastructure. A deep understanding of SIEM tools, security protocols, and cloud technologies is essential for this role.


Job Responsibilities


  • Design, implement, and integrate SIEM solutions for monitoring security events across networks, endpoints, and cloud infrastructure.
  • Develop and fine-tune SIEM rules and alerts to detect suspicious activities, malware, phishing, and network intrusions.
  • Perform threat hunting using data collected from SIEM, EDR, and XDR tools (preferably Azure Cloud Defender).
  • Analyze and respond to security events, including real-time log correlation, data analysis, and incident triaging.
  • Collaborate with the SOC team to investigate and respond to security incidents, providing in-depth log analysis and event correlation.
  • Lead incident detection and response efforts, including containment, eradication, and recovery.
  • Stay current on emerging threats, vulnerabilities, and security technologies.
  • Ensure that SIEM solutions align with healthcare security standards and regulatory requirements.
  • Conduct periodic log reviews of critical systems and assets to maintain compliance.
  • Provide documentation and reporting of incidents, mitigation efforts, and system performance to ensure visibility and compliance.

Qualifications


  • Bachelor's degree in IT, Computer Science, Software Engineering or in Cyber Security.
  • 5-8 years of experience in IT Security.
  • Understanding of Cloud-based IT infrastructure.
  • Good reporting, documentation and presentation skills.
  • Knowledge of basic IT security concepts.
  • Knowledge of Incident Management Processes.
  • Hands-on experience with tools like MS Azure Cloud Defender, Manage Engine, or Cloudflare.
  • Knowledge of SIEM solutions, EDR, or XDR.
  • Soc-200 (OffSec) or GIAC Security Operations (SOC) or The Certified SOC Analyst.

Compensation and Benefits:


Financial:


  • Competitive salary and bi-annual bonus.
  • Fast track and uncapped career growth for high performers.
  • Company-sponsored vehicle financing (car and bike).
  • Interest-free loans.
  • Provident Fund: CureMD matches up to 8% of your base salary.

Health and Wellness:


  • In-house clinic with a team of certified male and female doctors with 24/7 telemedicine service.
  • Hospital treatment monitoring by company doctors.
  • Comprehensive health coverage for your immediate family (outpatient, inpatient, maternity and parents' inpatient).
  • Exclusive health benefits and discounts at top class clinics and labs.

🤝 Supportive Workplace:


  • Pick-up and drop-off services for female employees.
  • In-house daycare facility.
  • In-house gym and recreational area to unwind.

Continued Learning:


  • Company-sponsored trainings, workshops, development programs and retreats.
  • Paid specialized trainings/certifications.

The Difference You’ll Make:
At CureMD, every role, whether senior or junior, plays a pivotal part in transforming healthcare. By joining our innovative team, you’ll contribute to groundbreaking technology that directly impacts patient care, enhances healthcare efficiency, and saves lives globally. Your skills and passion will drive meaningful change, helping us deliver solutions that support healthcare professionals in critical, real-time settings. Together, we’re not just advancing technology — we’re making a tangible difference in people’s lives. Together, Let’s save lives.


You have reached your limit of 15 Job Alerts. To create a new Job Alert, delete one of your existing Job Alerts first.
Similar jobs alert created successfully. You can manage alerts in settings.
Similar jobs alert disabled successfully. You can manage alerts in settings.