Anunciado 9 de septiembre
Esta oferta no acepta candidaturas
Tipo de jornada
Sin especificar
Tipo de contrato
Sin especificar
Salario
Salario sin especificar
Estudios mínimos
Sin especificar
Nivel
Sin determinar
Número de vacantes
1
Número de inscritos
1
Tags Relacionados
Descripción del empleo
  • International project|Career growth

International leading engineering materials company and highly integrated solution provider committed to the sustainable future of polyamides with presence in EMEA and the Americas.




Main Assignments:

  • Monitor incoming event queues using security management tools.

  • Identify, categorize, prioritize, and investigate correlated events.

  • Perform investigation and triage of events and incidents and escalate according to SOPs.

  • Implement and run continuous monitoring tools to prevent, detect, analyze, and respond to security incidents (e.g. malware detection, antivirus, EDR, IDS, WAF…).

  • Maintain shift logs with relevant activity.

  • Document investigation results and provide relevant details for final analysis.

  • Develop reports, dashboards, real-time rules, filters, and active channels, etc.

  • Provide event/incident procedure, long-term analysis, and provide investigation reports.

  • Configure SIEM tool performance and event data quality to maximize SIEM system efficiency.

  • Assist cyber security team with device event correlation.

  • Develop and institute standard procedures for the security operation Based on Mitre Att&ck



Other Assignments:

  • Deliver Information Security Reporting and KPI's.

  • Manage execution of localized Information Security specific projects.

  • Support the business to identify to respond to external audits with regards to Information Security.


  • International growing project

  • Great location within a multicultural environment

  • A competitive salary package plus social benefits






Requisitos mínimos

Our Senior SOC Analyst must be having hands on experience working in a security operation centre for at least 5 years as Tier-1 and Tier-2 with potential leadership skills to advance his/her career path.

The following experiences are expected from the SOC analyst:

  • Should have 5 years of working with top tier SIEM vendors (Qradar, Splunk, SentinelOne, Logrhythm,…)

  • Experience working with SOAR

  • Triage of logs

  • Assessing the scope of attacks

  • Identifying the affected assets

  • Remediating attacks and incident response

  • Configuring security tools

  • Ethical Hacking experience

  • Computer forensics

  • Reverse Engineering

  • Defence in Depth Knowledge



Required:

  • S. in Computer Science or Information Technology systems security, or similar field (advanced degree preferred).

  • CEH (Certified Ethical Hacker) or equivalent certification

  • Experience with the NIST Cybersecurity Framework will be highly valued.

  • Experience working with at least one of the top tier SIEM vendors (Qradar, Splunk, SentinelOne, Logrhythm)

  • Currently holding the role as SOC Analyst or similar role



Other:

  • Proficient oral and written communication skills in English.

  • Driving License.

  • The candidate must be in possession of a EU working permit.

  • The candidate must be willing to travel up to 10% of the time-once the global pandemic health situation allows it-.



Compartir esta oferta