Careers
Spectrum Career Opportunities
Who We Are
Spectrum is a Managed Security Services Provider situated in Cyprus and we are part of the GCC Group of Companies.
Our aim is to provide tools and knowledge to our customers that allow monitoring of threats and understanding their exposure to cyber risk through an umbrella of managed services.
If you like solving puzzles and be on top of things at all times, then a position to our company is the ideal, next step for your career!
We want to invest in your talent!
Thank you for your interest in employment opportunities at Spectrum
Currently, we do not have any open positions, however, if you are interested in possible future opportunities, please send your resume by submitting the form below.
We will be in touch if a role becomes available that matches your skills and experiences.
SOC Analyst Level 1
SOC Analyst Level 1
Job Description:
The Junior SOC Analyst (Level 1) will join our SOC team and utilize a variety of tools to investigate incidents and take immediate action or recommend a course of action to protect customers' infrastructure.
The Junior SOC Analyst (Level 1) is responsible for monitoring and responding to security-related alerts. The Security Operations Center operates with shift coverage in which the successful candidate will participate.
Key Responsibilities:
- Active participant in operations of the SOC. This includes proactively monitoring and providing near-real-time cybersecurity status and reports to enable timely decision-making, and monitor and investigate alerts sent to the SOC.
- Maintain situational awareness of emerging cyber trends by reviewing open-source reports for recent vulnerabilities, malware, and other threats that have the potential to impact the organization.
- Operate within direction to investigate and escalate by protocols and contractual SLAs as well as procedures.
- Triage and validate security alerts and escalate incidents, as required.
- Troubleshoot system misconfigurations and recommend best practices for remediation.
- Take initiative in evaluating, proposing, and deploying various detection capabilities.
- Integrate and share information with other analysts and other teams.
- Deliver status reports, briefings, recommendations, and findings to management as required.
- Staying up to date with current security vulnerabilities, attacks, and countermeasures.
- Answer incoming calls and monitor various e-mail accounts and act according to SOC procedures and processes.
Required Qualifications:
- Bachelor’s degree from an accredited institution in Computer Science, Information Technology, or a related discipline, or equivalent experience/combined education, with some relevant working experience and specialized training.
- SOC TIER 1: Minimum 1-year experience in cyber operations.
- Basic understanding of the cyber landscape and typical threat vectors.
- Ability to adjust to shift rotational schedule.
- Knowledge of Network environment concepts including TCP/IP stack (OSI Model), DNS, DHCP, firewalls, VPN, NAC, IDS/IPS.
- Knowledge of Web Security technologies including OWASP.
- Strong verbal and written communication skills, fluent in English.
- Knowledge of various security methodologies and processes, and technical security solutions (firewall, proxy, intrusion detection systems).
Other Skills and Abilities:
- Excellent Interpersonal Skills (develop and maintain strong working relationships).
- Strong work ethic.
- Detailed oriented with strong written and verbal communication skills.
- Ability to prioritize tasks.
- Strong organizational skills.
- Occasional overtime may be required.
- Basic telephone operation skills.
- Excellent customer service skills.
- Willing to learn and join training to improve their knowledge.
Preferred Qualifications & Skills:
- 1+ year of technical security-related experience.
- Experience with SIEM solutions.
- Experience with firewalls, routers, or antivirus appliances.
- Scripting language skills in Python or PowerShell are preferred.
- Information Security Certifications, i.e. GCIH, SEC+, Network+, GCIA, GSEC.
SOC Analyst Level 2
This is Modal Title
Job Description:
The Tier 2 SOC Analyst will leverage a variety of tools and resources to proactively detect, investigate, and mitigate emerging and persistent threats impacting customer’s networks, systems, and applications.
Key Responsibilities:
- Forensics and Incident response:
- Serve as escalation point for conducting investigations into security incidents involving advanced and sophisticated threat actors and TTPs
- Perform forensic collection and analysis of electronic assets, devices, and log sources
- Manage incident response activities including scoping, communication, reporting, and long-term remediation planning
- Threat Hunting:
- Identify, collect, and analyse threat intelligence from internal and external sources and teams
- Develop hypotheses, analyse techniques, and execute hunts to identify threats across the environment
- Interface with security teams and business stakeholders to implement countermeasures and improve defences
- Big Data analysis and reporting:
- Utilizing SIEM/Big data to identify abnormal activity and extract meaningful insights.
- Research, develop, and enhance content within SIEM and other tools
- Technologies and Automation:
- Interface with engineering teams to design, test, and implement playbooks, orchestration workflows and automations
- Research and test new technologies and platforms; develop recommendations and improvement plans
- Day to day:
- Coordinate investigation, containment, and other response activities with Customers
- Provide mentoring of junior staff and serve as point of escalation for higher severity incidents
- Develop incident analysis and findings reports for management, including gap identification and recommendations for improvement
- Recommend or develop new detection logic and tune existing sensors / security controls
- Work with security solutions owners to assess existing security solutions array ability to detect / mitigate the abovementioned TTPs
- Creating custom SIEM queries and dashboards to support the monitoring and detection of advanced TTPs against company network.
- Develop and review technical documents and checklists to explain abstract IT and cybersecurity technologies and concepts
- Develop and review detailed or complex technical documents such as techniques, tactics, and procedures (TTPs), concepts of operations (CONOPS), special instructions and engineering plans, for supported enterprise IT and cybersecurity technology, services, applications, and processes
- Host and/or participate in technical meetings as necessary
Required Qualifications:
- Education: Bachelor’s degree in Computer Science or a related field Relevant Technical Security Certifications.
- Experience required: 5+ years of experience in Incident Response / Computer Forensics / SOC team / Threat Hunting or related fields
- Host and network based forensic collection and analysis
- Dynamic malware analysis, reverse engineering, and/or scripting abilities
- Proficient with forensic tools
- Understanding of Advanced Persistent Threat (APT) and associated tactics.
- Research, enrichment, and searching of indicators of compromise
Experience:
- Experience managing security solutions preferably in an enterprise environment, or at minimum ability to demonstrate proficiency in using IDS solutions in smaller scale
- Experience managing and configuring (or triaging events from) enterprise-level firewalls or vulnerability scanners is considered a plus
- Experience with SIEMs, ticketing systems and other platforms in SOC environments.
- Experience with ansible is considered a plus.
- Threat hunting experience is considered a plus.
- CompTIA Security+/CySA+, SBTL 1, SBTL2, CCD or similar level cyber security certifications from other vendors is a must.
Other Skills and Abilities:
- Very strong team and interpersonal skills along with the ability to work independently and achieve individual goals.
- Coordinate with other team members to achieve the specified objectives.
- Effective oral and written communication skills.
- Detailed oriented with strong written and verbal communication skills
- Ability to prioritize tasks.
- Strong organizational skills
- Occasional overtime may be required
- Excellent customer service skills
- Mentor Junior SOC Analysts
- Willing to learn and join training to improve their knowledge
- Scripting Language skills in Python or PowerShell
Preferred Qualifications & Skills:
GCIA, GCIH, GMON, SBTL1, SBTL 2, CCD or related certifications are considered a plus
Business Development Manager (Cybersecurity Services)
This is Modal Title
Job Description:
The Business Development Manager is a customer-facing role responsible to manage, develop and maintain direct relationship with customer accounts in order to maximize sales and enable GGC Computers Ltd to achieve revenue targets and market share growth for Spectrum Services.
Main Responsibilities:
- Develop Account plans to handle customer accounts and execute them in a planned, organized and regularly monitored fashion
- Strengthen the relationship with the key decision makers of customer accounts
- Identify target markets, develop and implement innovative sales and marketing strategies
- Implement activities defined in quarterly marketing plan with the help of the central marketing team
- Generate, track and report sales proposals and leads.
- Drive the successful closing of identified leads throughout the sales cycle with the aim to achieve the Spectrum sales revenue targets
- Provide excellent customer service together with the assistance of the rest of the Spectrum team
- Prepare and submit relevant reports to management
Candidate Profile:
The candidate should meet the following minimum requirements
- Previous experience in selling cybersecurity or IT services
- Foundational knowledge of cybersecurity concepts, products and/or solution categories
- Excellent group presentation skills with the ability to engage with an audience
- Excellent communication skills oral written and presentation
- Understanding of one or more of the following technologies, SIEM, EDR, SOC, MSSP
- Ability to communicate effectively at various levels within client prospects
- Understanding of SAAS and/or Cloud infrastructure will be considered a plus
- Proven track record of sales growth and customer upselling