Job Description The Security Operations Engineer is responsible for the deployment, configuration, management, and maintenance of security solutions in our organization, ensuring that the organization's security systems are functioning correctly and that any vulnerabilities are identified and addressed. You will work closely with your IT colleagues to ensure that security is integrated into all aspects of the organization's infrastructure and act as guardians of the IT estate. Responsibilities The responsibilities of the Security Operations Engineer include: Deploying and configuring security solutions such as firewalls, intrusion detection systems, and antivirus software Monitoring security systems to identify and respond to security incidents Conducting vulnerability assessments and penetration testing Developing and implementing security policies and procedures Investigating security incidents and developing remediation plans Providing technical guidance and support to other IT professionals Qualifications The skills required for a Security Operations Engineer include: Knowledge of security technologies such as firewalls, intrusion detection systems, and antivirus software Familiarity with networking and operating systems Understanding of security principles and best practices Analytical and problem-solving skills Effective communication and collaboration skills Ability to work under pressure and respond to security incidents quickly Stay informed about current CVEs and emerging threats, with the ability to track, assess, and ensure coverage to safeguard the organization's security posture. Educational Backgrounds A bachelor's degree in computer science, information technology, or a related field is typically required for a Security Operations Engineer. Relevant certifications such as CompTIA Security+, CISSP, or CCNA Security may also be beneficial. Tools and Software Used Security Operations Engineers may use a variety of tools and software, including: Firewalls such as Cisco ASA, Barracuda NGFW/WAF, Azure Firewall Intrusion detection and prevention systems such as Snort or Suricata Hands-on experience with Microsoft Defender 365, Purview Vulnerability scanners such as Nessus or Qualys Security information and event management (SIEM) systems such as Microsoft Sentinel #J-18808-Ljbffr