- Top
- Job Listings
- Cyber Security Expert
JOB ID 26327
Cyber Security Expert
- Manufacturer, Automotive Parts
- IT, Network, Infrastructure engineer, Cyber Security
- Kanagawa
- ¥5,000,000~¥8,000,000
We are a Japan-based commercial vehicle manufacturer that develops, manufactures, and sells trucks, buses, and industrial engines. With production bases and sales networks in Japan and overseas, the company provides products to more than 170 countries and regions around the world, and is developing manufacturing that takes advantage of its global network.
The company is also progressive in its approach to environmental responsiveness, actively promoting the development of electrification and environmental technologies, and was one of the first to introduce mass-produced light-duty electric trucks to the market. The high level of technology and quality that we have cultivated over the years is highly regarded both domestically and internationally, and we are trusted by our business partners, and our diverse corporate culture is characterized by a global workforce.
This individual will work closely with other cybersecurity, IT, and risk teams to ensure the confidentiality, integrity, and availability of digital assets.
This individual will work closely with other cybersecurity, IT, and risk teams to ensure the confidentiality, integrity, and availability of the organization's digital assets.
Job Description
-
- Responsibilities
- ■SOC Operations Management
Leadership and management of a 24/7 SOC (Tier 1-3 analysts and incident response personnel)
Ensure continuous security monitoring, analysis, and incident response capabilities
Develop and maintain operational playbooks, procedures and SOPs
Promote operational excellence by adhering to SLAs, KPIs, and various metrics
Incident Response and Threat Management
Oversight of security incident lifecycle (identification, containment, eradication, recovery, and post-incident analysis)
Collaboration with internal and external parties in the event of a security incident
Rapid escalation, reporting, and remediation of security threats
■ Team leadership and development
Mentoring and training SOC analysts to improve their technical and incident response skills
Conduct periodic performance reviews and skills assessments
Lead recruitment and onboarding of SOC personnel as needed
■Tools, Automation, Integrated Management
Azure Sentinel, SIEM (RSA/Splunk/LogRhythm/QRadar) and SOAR platform management and optimization
Integration of threat intelligence, EDR, NDR, vulnerability management, and log sources
Promote automation of repetitive tasks and playbooks using SOAR tools and scripts
Understanding of logs, including HTTP, SMTP, networking, etc.; knowledge of operating systems and servers; ability to conduct technical sessions and lectures
■ Threat Intelligence and Hunting
Work with Threat Intelligence team to drive identification of potential threats
Conduct and supervise threat hunting activities to detect potential attackers
Maintain knowledge of the latest attacker TTPs (tactics, techniques, and procedures)
Compliance and Reporting
Implementation of SOC operations to support compliance with ISO 27001, NIST, PCI-DSS, GDPR and other frameworks
Provide regular reports on SOC effectiveness, incident trends, and threat trends
Respond to internal and external audits, provide evidence and documentation
SOC Operations Management
Lead and manage a 24/7 Security Operations Center (Tier 1-3 analysts and incident responders).
Ensure continuous security monitoring, analysis, and incident response capabilities.
Develop and maintain operational playbooks, procedures, and SOPs.
Drive operational excellence by enforcing SLAs, KPIs, and metrics.
Incident Response & Threat Management
Oversee the end-to-end lifecycle of security incidents: identification, containment, eradication, recovery, and post-mortem analysis. recovery, and post-mortem analysis.
Coordinate with internal teams and external stakeholders during security incidents.
Ensure timely escalation, reporting, and remediation of security threats.
■Team Leadership & Development
Mentor and train SOC analysts to improve technical capabilities and incident handling maturity.
Conduct regular performance reviews and skill assessments.
Lead recruitment and onboarding for SOC personnel as needed.
■Tooling, Automation & Integration
Manage and optimize Azure Sentinel, SIEM - (RSA / Splunk / LogRhythm/Qradar ), SIEM (e.g., Splunk, QRadar,. LogRhythm) and SOAR platforms.
Ensure integration of threat intel, EDR, NDR, vulnerability management, and log sources.
Drive automation of repetitive tasks and playbooks using SOAR tools or scripting.
Ability to Comprehend Logs (HTTP, SMTP, Network), Operating systems and servers, Organizes Technical Sessions / Talks.
■Threat Intelligence & Hunting
Collaborate with threat intelligence teams to proactively identify potential threats.
Conduct or oversee proactive threat hunting activities to detect stealthy attackers.
Stay abreast of the latest threat actor TTPs (Tactics, Techniques, and Procedures).
Compliance & Reporting
Ensure SOC operations support compliance with frameworks such as ISO 27001, NIST, PCI-DSS, GDPR, etc.
Provide regular reports to management on SOC effectiveness, incident trends, and threat landscape.
Support internal and external audits with evidence and documentation.
-
- Requirements
- Bachelor's degree in Information Security, Computer Science, Risk Management, or related field
- 10+ years of experience in information security, 5+ years of leadership experience in SOC
- Deep knowledge of security technologies such as SIEM, EDR, SOAR, Firewalls, IDS/IPS, DLP, Threat Intelligence, etc. In-depth knowledge of security technologies
- Expertise in cyber attack techniques, threat trends, and incident response
- Understanding of security frameworks such as MITRE ATT&CK, Cyber Kill Chain
- Certified SOC Analyst (CSA), Certified Incident Handler (GCIH) or equivalent
・Language skills: Native level Japanese, Business level English
・Bachelor's degree in information security, Computer Science Bachelor's degree in information security, Computer Science, Risk Management, or a related field.
・10+ years of experience in information security, with at least 5 years in a leadership role within a SOC.
・Strong Strong understanding of security technologies: SIEM, EDR, SOAR, firewalls, IDS/IPS, DLP, threat intelligence, etc.
In-depth knowledge of cyberattack techniques, threat landscapes, and incident response.
・Familiarity with MITRE ATT&CK, Cyber Kill Chain, and other security frameworks.
Certified SOC Analyst (CSA), Certified Incident Handler (GCIH), or similar.
・Japanese native level, English business level
-
- Preferred
- CISSP, CISM, CCSP, OSCP, CEH, GCIA, GCFA, or related certifications.
-
- Location
- Kanagawa
-
- Work Style
- Remote working possible, Flex working possible
-
- Salary
- ¥5,000,000~¥8,000,000
-
- Attractive
Points - Over 50% Mid-Career Hires, Childcare support system, Foreign capital company, Make use of languages, Weekends and holidays off, Major corporation
- Attractive
Consultation
Our expert team is dedicated to empowering your career change, crafting tailored career plans, and securing the best job opportunities in the automotive and mobility sectors.
Search by Industry
Search by Job Type
Search by Location
- Top
- Job Listings
- Corporate IT