[What the role is]
LEAD / PRINCIPAL TECHNICAL CYBER ENGINEER[What you will be working on]
The SOC Tech Lead is the technical authority for all security monitoring and detection platforms within the Cybersecurity Operations Centre. This role drives the architecture, engineering quality, and continuous improvement of the SOC's detection capabilities, tooling stack, and automation workflows. The Tech Lead bridges detection engineering with operational execution, ensuring that analysts at every tier are equipped with reliable, high-fidelity signals and efficient tooling.
Job Scope
Detection Engineering & Use Case Development
Platform Architecture & Integration
SOAR & Automation Engineering
Technical Standards & Governance
Analyst Enablement & Technical Leadership
Threat Hunting & Continuous Improvement
[What we are looking for]
• Knowledge in Computer Science, Computer Engineering, Data Science, or related technical discipline
• Hands-on expertise in Microsoft Sentinel
• Proficiency in KQL or exposure to SIGMA rule format is advantageous
• Operational and integration experience with CrowdStrike Falcon
• Experience designing and building SOAR playbooks on platforms such as FortiSOAR, Microsoft Sentinel Automation
• Working knowledge of firewall policy, WAF rules (e.g., Akamai), and proxy/DNS security controls — sufficient to validate log source quality and detection logic
• Practical knowledge of Microsoft Azure security services and AWS security logging (CloudTrail, GuardDuty, Security Hub); ability to onboard cloud-native log sources into SIEM
• Proficiency in Python and/or PowerShell for automation, API integration, and log enrichment pipelines
• Demonstrated ability to map detections to ATT&CK tactics, techniques, and procedures (TTPs)
• Experience with threat intelligence platforms (MISP, OpenCTI, or commercial TIP integration)
• Familiarity with DNSSEC, DNS security monitoring, and network traffic analysis
• Exposure to adversarial AI/LLM-based attack techniques and AI-assisted detection methods
• Knowledge of quantum-safe cryptography migration considerations as they relate to security monitoring
• Experience with CI/CD pipelines for detection-as-code practices (Git-based rule management, automated testing of detection logic)
• At least 5 years in cybersecurity with at least 3 years in a detection engineering, SOC engineering, or senior analyst role
• Possess relevant certification such as Microsoft Certified: Security Operations Analyst Associate (SC-200), Azure Security Engineer Associate (AZ-500), GIAC Certified Detection Analyst (GCDA) or GIAC Certified Enterprise Defender (GCED) or any ISACA certification
• Strong written and verbal communication
• Structured problem-solving mindset with attention to detection logic accuracy and operational impact
• Collaborative team leader who can balance platform stability with continuous improvement velocity
• Ability to operate under pressure during high-severity incidents while maintaining engineering rigour
As part of the shortlisting process for the role, you may be required to complete a medical declaration and / or undergo further assessment.