Vacancy caducado!
- 7-10+ years’ experience.
- Masters or bachelor’s degree in engineering.
- Bachelor's Degree in Business, Computer Science or in a STEM major (Science, Technology, Engineering, or Math).
- Minimum of 8 years of experience in Information Security.
- Experience as L2 SOC analyst (Help IT in analyzing alerts – deep analysis, determine nature of attack and systems and data affected, SOC reports, Liaison with SOC Vendor, reduce signal to noise ratio, improve MTTR)
- Experience in developing content in Splunk – searches, alerts (including POC and tuning), dashboards, Apps.
- Experience of Security Incident and Event Management (SIEM) tools (Splunk) – ingesting data (Forwarders, HTTP Event Collectors, add-ons), troubleshooting Splunk Installation.
- Experience in Endpoint security (EDR) – Detection and Response. Help create policies and SOP for Response workflow. Experience in Cortex XDR preferred.
- Experience in Email Security and running phishing campaign.
- Experience in Incident Management.
- Experience in system and network security.
- Experience in Network Penetration testing.
- Experience in supporting PCI compliance and GDPR programs is a plus.
- This skills needs be listed in most recent projects of candidate, Strong Vulnerability management (Qualys tool preferred), Splunk, PCI compliance, AWS.
- IT Administrator, Linux administrator, Desktop Management Admin, MS Azure, Google Cloud.
- Knowledge of software development, computer networks and Internet threat activity.
- Programming experience in python, perl and HTML/JS.
- Experience in continuous security infrastructure monitoring tools like Qualys is a plus.
- Previous enterprise or platform/cloud vulnerability management experience and Cloud Security is a plus.
- Must be able to work in a fast paced, high-profile environment.
- Excellent written and verbal communication skills, including experience engaging with executive and technical audiences.
- Identify and Monitor customer's Corporate Networks to determine if there have been any attacks.
- Design and implement safeguards to protect the system with the help of network engineers and other.
- Analyze network traffic to identify anomalies and test information security controls for weaknesses.
- Drive customers’ Corporate Security Program based on the NIST CSF – Identify, Detect, Protect, Respond and Recover.
- Lead the development, implementation, and maintenance of security policies, standards, and guidelines.
- members of the Technology Services team.
- Candidate will work as a member of the Corporate Security Team and assist in various day to day operational activities.
- Develops, publishes, and maintains a comprehensive organization-wide information privacy and security plans, policies, procedures, and guidelines.
- Drive the Third party vendor security evaluation.
- Participate in the security toll-gates on SSDLC projects.
- Respond to threats by taking mitigating actions to contain the activity and minimize damage. Participate in risk assessments and breach readiness exercises for incident management.
- Facilitate forensics analysis to determine the source of the threat. Document lessons learned as well as identify process improvements.
- Communicate security issues to management via reports, dashboards. Provide weekly metrics on overall security posture.
- Research emerging threats and work with the Security Operations Center (SOC).
- Implement innovative solutions to scale the program with emphasis on automation where applicable.
Vacancy caducado!