What could be your next challenge?
Join Hitachi Cyber, a global leader in cybersecurity, and become part of a dynamic team of experts dedicated to protecting organizations across various industries. As an Information Security Specialist, you’ll play a key role in delivering cutting-edge security services, leveraging tools like Microsoft Sentinel and Google SecOps (Chronicle) to detect, respond, and prevent threats.
You’ll play a key role in quality assurance, vulnerability management coordination, reporting, and proactive threat analysis and helping clients strengthen their security posture and stay ahead of emerging threats.
Your mission:
• Perform quality assurance reviews of SOC-generated incidents to ensure alerts from Microsoft Sentinel, Google SecOps, and other SIEM platforms are accurately captured, classified, and escalated.
• Collaborate with SOC analysts and engineering teams to improve alert fidelity, rule tuning, and incident-handling procedures.
• Prepare monthly operational and security performance reports and deliver presentations to clients, summarizing key metrics, incident trends, and improvement actions.
• Schedule and track vulnerability scans, ensuring scans are completed on time and results are communicated to relevant stakeholders.
• Support the onboarding and validation of new log sources, ensuring they are properly integrated into SIEM platforms for effective monitoring.
• Maintain and update documentation for alert flows, incident management procedures, and escalation paths.
• Conduct threat hunting activities and recommend new correlation rules or detections based on emerging threats, attack trends, or recent incidents.
• Contribute to continuous improvement efforts by identifying recurring issues, false positives, or detection gaps and recommending corrective actions.
• Provide expert guidance and support to clients on security-related issues.
• Lead complex incident response cases and provide post-incident recommendations.
• Mentor and coach junior analysts in technical and procedural areas.
• Participate in on-call rotations and security investigations.
What we’re looking for
• 3–5 years of experience in a security operations environment (SOC).
• A strong customer service mindset and ability to communicate clearly with both technical and non-technical audiences.
• Bachelor’s degree or equivalent professional experience in a related field.
• Hands-on experience with SIEM tools, especially Microsoft Sentinel and Google SecOps / Chronicle.
• Proven skills in incident response and security analysis.
• Deep understanding of packet capture and network protocols.
• Familiarity with vulnerability management and scanning tools.
• Cloud experience is considered a strong asset, particularly with Google Cloud and Microsoft Azure.
• Relevant certifications include in any of:
• Google Cloud Professional Cloud Security Engineer.
• Google Cybersecurity Professional Certificate.
• Microsoft Certified: Security Operations Analyst Associate (SC-200).
• Microsoft Certified: Azure Security Engineer Associate (AZ-500).
• Other Certifications such as GCIA, CEH, CISM, or CISSP (asset).
• Excellent communication skills in English and French.
#J-18808-Ljbffr