Role Summary
Plans, organizes, directs, controls and evaluates the
activities of the cybersecurity operations center (KKPFG’s Threat Collaboration
Environment) within an organization. Employed throughout the public and private
sectors.
Role and Responsibilities / หน้าที่ความรับผิดชอบ:
- Responsible for Security Operations and Cyber
Threat Intelligence (KKPFG’s Threat Collaboration Environment) Strategy.
- Provides immediate and detailed response
activities to mitigate or limit unauthorized cybersecurity threats and
incidents within an organization. This includes planning and developing
courses of action; prioritizing activities; and supporting recovery
operations and post-incident analysis.
- Plans, organizes,
directs, controls and evaluates the activities of the cybersecurity
operations center (KKPFG’s Threat Collaboration Environment) within an
organization. Employed throughout the public and private sectors.
- Responsible for
identifying, isolating, mitigating, and reporting critical incidents in a
timely and effective manner
·
Maintain situational awareness of escalated events and
alerts, tools status, vulnerability status, forensics and malware
investigations, intelligence status, and all other SOC functions
- Manages watchlist
and alerts assigned to technicians/analysts/engineers (quality and volume)
·
Manages and assists a team of analysts, engineers, and
technicians by providing guidance, mentoring, and performance feedback
·
Develops and maintain system
monitoring, process, policies, and procedures including documents standard
operating procedures (SOP’s)
·
Develops, improves, and maintains
procedures and workflows for SOC management, including escalation and notification
procedures
·
Develops improves, and maintains
metrics to measure the effectiveness of the SOC, including Service Level
Targets (SLT) compliance, response times, and customer satisfaction
- Responsible for
collecting data and information from various sources in order to identify,
monitor, measure and counter cyber threats.
- Provide current,
actionable threat intelligence in order to drive comprehensive detection
coverage against global/opportunistic and healthcare-specific threat
vectors
·
Perform threat hunting across a multi-OS/multi-cloud
environment
·
Perform in detection engineering prototyping and
prioritization efforts
·
Assist with red team/adversary emulation activities to
assess efficacy of existing security controls
·
When required, provide intelligence support for security
engineering, risk analysis, and incident-response efforts