Advanced knowledge of the Palo Alto Cortex XSOAR platform
Ability to create documentation for Palo Alto Networks Cortex XSOAR playbooks
Proficient in Python, JavaScript, and PowerShell are an asset
Good understanding of REST/SOAP/WSDL/XML (Web services)
Understanding of cybersecurity incident response procedures, experience as a Security Incident Responder or SOC analyst is a plus
Strong understanding of cybersecurity technologies, protocols, and applications
The main responsibilities of the role are
Focus on the development, maintenance, and delivery of new Security Orchestration and Automation content including custom SOAR Playbooks, Automations/Scripts, Jobs, dashboards, reports, widgets, RESTful API integrations, and code via Continuous Integration/Continuous Delivery pipelines adhering to an Agile development practice
Reduce Incident Response efforts and increase quality leveraging XSOAR for Security Orchestration, Automation and Response (SOAR)
Automate manual SOC procedures and develop, implement, and maintain playbooks
Document SOAR workflows, scripts, and develop, test and debug code and use established code repository for tracking.
Use python/other Scripting languages to perform the customizations to develop the required automation.
Work with the existing playbook framework and ensure the amendments are hooked properly to the existing framework.
Prioritize and coordinate backlog of SOAR integration and automation requests, making sure we have a healthy balance between defect resolution and new features.
Work in partnership with the incident response team to design to identify opportunities for improvement
Note:
To get accepted you must be based in Belgium, France, or The Netherlands.
If you are a UK based resident then you will only get accepted if you work via an accredited umbrella company
Being 4 days a month on site in Belgium is mandatory.