WE ARE
SoftServe is a global digital solutions company with headquarters in Austin, Texas, founded in 1993.
Our associates are currently working on 2,000+ projects with clients in the USA, Europe, and APAC region.
We are about people who create bold things, who make a difference, who have fun, and who love their work.
Critical Services Center of Excellence (CoE) as the subdivision of SoftServe, is a team of highly professional folks, with the primary focus on technology covering software architecture, startups, and enterprise technologies.
SoftServe transforms business through various levels of security assessment, creating and executing threat scenarios, identifying the security risks, and filling the gaps.
We have a proactive approach while consulting our clients on security management and analyzing the entire infrastructure on multiple layers.
In this way, we design an efficient security strategy following the security standards (ISO27k, CIS Benchmarks, NIST, SOC2, HIPAA, PCI DSS, etc.) and considering the client’s short- and long-term goals.
IF YOU ARE
A professional with 3-5 years of experience in Security Operations Center (SOC) activities, threat hunting, or incident response and proven track record in detection engineering and security alert tuningA specialist with SIEM platforms (Splunk, Elastic, Sentinel, or similar), threat hunting experience using various methodologies and frameworks (MITRE ATT&CK, Kill Chain, etc.)Experienced with APIs, webhooks, and data ingestion from various security platformsSkilled in Python, PowerShell, or similar languages for security automationStrong in analytical skills with experience in log analysis, pattern recognition, and correlationAdept at network security: network protocols, traffic analysis, and network-based threats; endpoint security: host-based detection, malware analysis, and endpoint threat huntingProficient in mapping threats and detections to ATT&CK techniques, threat Intelligence: consuming and operationalizing threat intelligence feedsFamiliar with SOC 2, PCI-DSS, HIPAA, and other security standards (preferred)Knowledgable in cloud-based threats and detection in AWS, Azure, or GCP environmentsExceptional in both verbal and written communication, capable of leading and influencing virtual teamsFluent in English (Upper-intermediate level) and comfortable in a multicultural environmentAND YOU WANT TO
Take a leading role in shaping detection philosophy: define and evolve our overall detection strategy, determining what threats to prioritize and how to identify them effectivelyWork on alerting optimization: design intelligent alert prioritization frameworks to maximize analyst efficiency and reduce false positivesSupport threat intelligence integration: advise on incorporating threat intelligence feeds and indicators into our detection logicDevelop use cases: create and refine detection use cases based on emerging threats and attack techniquesAdvise on architecture: guide developers on integrating various security tools (EDR, SIEM, threat intelligence platforms, etc.) into our unified platform from functional perspectiveData pipeline optimization: recommend approaches for processing and enriching security data at scaleProactive hunting: conduct advanced threat hunting exercises to identify sophisticated threats that may evade automated detectionAttack pattern recognition: analyze attack techniques and recommend corresponding detection mechanismsThreat landscape monitoring: stay current with evolving attack methods and adversary tacticsTOGETHER WE WILL
Cooperate with the world-leading companies and peopleWork on a big range of projects and clientsHave a variety of projects with different types of needs and requirementsWork towards giving you a highly independent position with total ownership and accountability, but also support when neededGet a great deal of learning and development opportunities along our structured career pathDevelop your cybersecurity skills, leadership, communication, and negotiation skillsHave access to strong educational and mentorship programs