Acts as the interface for escalations between the stakeholders and SOC
Management reporting on program effectiveness and escalation, as required, for additional program support
Review of the types of requests being sent to the CGSoc mailbox for opportunities to improve the program
Ensure appropriate training and performance indicators are in place for individuals who may be required to act as IR Manager, or applicable roles such as CGSoc analysts
Ensure that the CGSoc Incident Response Framework is followed and appropriate artifacts are developed during incident response
Maintain familiarity with the ST Engg IR framework in order to be able to support the Incident Manager
Conduct Incident Management, as required
Requirements
Knowledge with the following technical SOC skills: Incident Response, Log Analysis, TCP/IP, Network Traffic Analysis, Antivirus/Malware, Intrusion Detection/Prevention, Packet Analysis Techniques, Event Correlation, and Incident Triage
Strong abilities to communicate at technical and business level
Working knowledge of information security and information systems - both at the conceptual and operational level
Working experience in a SOC or in a managed security service provider will be an advantage
Excellent interpersonal, co-ordination and issue resolution skills
High level of initiative, ownership of issues, accountability, professional diligence, attention to detail and ability to follow process
Able to work un-supervised as well as being able to work as part of a team in an unstructured environment
Proactive, flexible attitude to work with a willingness to constantly review and improve skills and process
Excellent written, oral and customer facing skills
Responsive in all communication
CISSP, CISM or other information security certifications will be an advantage