- Company Name
- Ikighia
- Job Title
- CDI - Ingénieur cybersécurité SOAR (H/F)
- Job Description
-
**Job Title**
Cybersecurity Engineer – SOAR (H/F)
**Role Summary**
Design, deploy, and sustain a Security Orchestration, Automation, and Response (SOAR) platform to enhance incident response capabilities for a major client. Manage end‑to‑end automation workflows, integrate SOAR with security tools (SIEM, EDR, threat intelligence, IAM, firewalls), and apply DevOps and AI methodologies to improve alert triage and threat hunting.
**Expectations**
- Minimum 3–5 years of experience in operational security, specifically SOAR implementation and operation.
- Proven track record of building and maintaining SOAR environments (Shuffle.io, Cortex XSOAR, Splunk Phantom, Swimlane, etc.).
- Strong scripting and playbook development skills.
- Experience with CI/CD, IaC, and DevOps practices.
- Ability to work independently in an agile setting and lead technical initiatives.
**Key Responsibilities**
- Choose, design, and deploy a SOAR solution aligned with client requirements.
- Integrate SOAR with SIEM, EDR, threat intelligence feeds, IAM, firewalls, and other security tools.
- Develop, test, and maintain automation playbooks for alert triage, data enrichment, containment, and threat response.
- Orchestrate cross‑tool actions to reduce detection‑to‑response time.
- Monitor platform high availability, resilience, and technical evolution.
- Measure automation efficiency, report performance metrics, and recommend improvements.
- Explore and implement AI/ML capabilities (LLM, threat hunting assistance).
- Apply DevSecOps practices: version control, automated testing, CI/CD pipelines for playbooks and connectors.
**Required Skills**
- SOAR platform expertise (Shuffle.io, Cortex XSOAR, Splunk Phantom, Swimlane, etc.)
- Scripting/Programming (Python, PowerShell, Bash) for playbooks and connectors
- DevOps tools: Git, GitLab CI/CD, Docker, Ansible; Kubernetes knowledge a plus
- Security Operations: SOC operations, incident response, threat hunting, SIEM, EDR, threat intelligence feeds, IAM, firewalls
- AI/ML fundamentals for enhancing alert classification and decision support
**Required Education & Certifications**
- Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).
- Industry certifications highly regarded: CEH, CCSP, Certified SOC Analyst, GIAC Security Operations (GSOC), or equivalent.
---