The company is seeking its first Blue Team Engineer to design, build, and operate its Security Operations capability. This role will be responsible for implementing monitoring, detection, and response processes while laying the foundation for a future SOC team. The engineer will be both hands-on and strategic, combining deep technical expertise with the ability to shape security operations and guide future hires.
Key Responsibilities 1. SOC Development & Operations
Support the design, implementation, and day-to-day operation of the company’s SOC capabilities (SIEM, EDR, log management, network security (IDS/IPS), monitoring pipelines, SOAR).
Develop and maintain detection rules, alert logic, and security monitoring use cases.
2. Threat Detection, Response & DFIR
Monitor and investigate security events, conduct root cause analysis, and participate in containment and remediation activities.
Contribute to the development of DFIR processes, playbooks, escalation paths, and evidence-handling procedures.
Engage in proactive threat hunting aligned with MITRE ATT&CK and threat intelligence feeds.
3. Security Operations Support
Contribute to vulnerability management, patch management, and secure configuration management initiatives.
Support privileged access management (PAM) implementation and monitoring.
Participate in business continuity and disaster recovery planning, including testing and improvement of response processes.
Provide input into threat intelligence collection, analysis, and operational integration.
4. Continuous Improvement & Collaboration
Assist in tabletop exercises, simulations, and training activities to validate incident response readiness.
Collaborate with IT, AppSec, and Red Team functions to improve defenses and close security gaps.
Document findings, lessons learned, and recommendations for enhancing overall security posture.
Partially contribute to security policies, standards, and compliance initiatives (ISO 27001, SOC2, etc.) and collaborate with the GRC team.
Integrating AI solutions into the proactive defense system.
Job Requirement
We are looking for a highly motivated person with:
2-3+ years of experience in security operations, blue team engineering, or incident response.
Strong experience with SIEM platforms (e.g., ELK Stack, Wazuh, Splunk, Graylog), EDR tools, IDS/IPS, and network security.
Hands-on expertise in log analysis, network traffic analysis, memory and application forensics, and endpoint forensics.
Foundation skills in malware analysis.
Experience with scripting/automation (Python, PowerShell, Bash, etc.).
A proactive attitude & the ability to think outside of the box
Works in an organised, structured manner
Can do attitude, gets things done
Excellent communication skills with diverse audiences
Strong critical thinking and analytical skills
Nice-to-have:
Solid understanding of security frameworks and methodologies (MITRE ATT&CK, NIST CSF).
English communication.
Experience leading or mentoring SOC analysts or security engineers.