.Stimulating.Motivating.Challenging.Leveraging its long-standing expertise in securing digital content as well as fighting piracy, Kudelski Security, a division of the Kudelski Group, is a provider of cybersecurity solutions and services focused on protecting data, processes, and systems for companies and organizations around the world, safeguarding their assets at a time of increasingly remote communications.Mission As part of the Kudelski Security's Managed Detection and Response (MDR) department, the Cyber Security Operations Engineer is responsible for delivering to our clients a customized MDR services experience which complements its standard service offering.He will be the privileged liaison between the client and the Cyber Fusion Center for all security operations matters. He will be interacting intensively within the Cyber Fusion Center and with the client staff.Responsibilities Threat MonitoringBe the main point of contact of the Cyber Fusion Center at the client's side.Support standard Cyber Fusion Center activities such as threat monitoring, security service management, endpoint detection and response, and vulnerability scanning services.Investigate/remediate incidents escalated by the Cyber Fusion Center or client's internal units.Write specific incident response playbooks for the client.Define, test, deploy, or perform specific use cases and correlation rules, threat hunting activities, and threat intelligence activities for the client.Support large-scale incident response activities.Service ImprovementPerform rules tuning of client SIEM in operation.Support rules factory program in improving the global set of detection.Qualify, analyze, and provide recommendations for new standard data source requests.Support product teams to build best new services to fit with operations capabilities.Contribute to client's security projects.Implement new tools or scripts to increase security operations' efficiency.General ResponsibilitiesTake responsibility for customer satisfaction and overall success of managed services.Recommend improvements for Standard Operating Procedures.Propose enhancements on tools and workflow.Document actions in tickets to effectively communicate information internally and to customers.Adhere to policies, procedures, and security best practices.Requirements / Profile You have:Minimum 3 years' experience in information security, particularly in cyber operations.Excellent client service skills.Knowledge of incident response processes (detection, triage, incident analysis, remediation, and reporting).Experience with one or more of the following technologies: EDR/NGAV, SIEM (Splunk), Vulnerability Scanning, Managed Attacker Deception, SOAR.Experience reviewing and analyzing log data, network packet capture.Strong knowledge of Windows/Linux OS, network protocols, scripting languages.Good knowledge in Cloud and OT/ICS technologies