Descrição de Vaga



Código: 6741
Título da vaga: SOC Tier (1) - Analyst
Local: São Paulo,São Paulo
Região: Outra
Tipo de emprego:
Nível Profissional:
NÍvel Acadêmico: Ensino Superior Completo
Turno/Horas:
Habilidades: Soft Skills:

· Microsoft Office (Advanced)

· Ticketing System (Intermediate)

· Documentation (Intermediate)

· Problem Solving (Intermediate)

· Cyber Kill Chain (Intermediate)

· Operational Procedures (Intermediate)

· Cyber Incident Response (Intermediate)


Technical Skills:

· Malware Analysis (Novice)

· Log Analysis (Intermediate)

· Network Forensics (PCAP, Packet Analysis, Wireshark, etc.) (Novice)

· Host Forensics (Intermediate)

· SIEM (Security Information & Event Management) (Intermediate)

· Email Analysis (Intermediate)

· Windows Operating System (Intermediate)

· Linux Operating System (Novice)

· Mac Operating System (Intermediate)

· Endpoint Protection (Intermediate)

· Antivirus (Advanced)

· Vulnerability Management (Novice)

· Network Security (IDS, Firewalls, Web Proxy, etc.) (Intermediate)

· Splunk (Intermediate)

· Threat Intelligence (Novice)
Categoria:
Remuneração Básica: -   - 
Benefícios: 0
Resumo da Vaga: Monitor, analyze, and triage cyber security alerts.

Take ownership of in scope cyber incident investigations (unless escalated to Tier 2 or Company in accordance with defined processes).

Create, manage, and follow up on service tickets.

Follow defined processes.

Correlate data from various sources made available by Company for the purpose of .

Assist WDT with guiding the appropriate remediation steps for cyber events via email, conference calls, phone calls, and instant messaging.

Design, create, and update documentation as directed by Company.

Research and analyze threat intelligence and indicators of compromise (IOC).

Identify security technology deficiencies and manage remediation.

Analyze malware using security technologies provided by Company.

Review logs, decipher false positives, and track incident investigations from start to finish.

Evaluate risk of cyber events and appropriate remediation.

Update service tickets and cases with investigation evidence.

Analyze emails for phishing or malicious content.

Retrieve and analyze host / endpoint and network artifacts.

Generate reports, graphs, summaries, metrics, dashboards, and other operational supportive documentation.

Identify root cause through cyber incident investigations.

Correlate vulnerability and patch data with cyber events.

Take ownership of in scope cyber incident investigations (unless escalated to Company in accordance with a mutually defined processes).

Mentor and support Tier 1 requests.

Analyze raw data feeds for anomalies.




Enviar este trabalho para um amigo
Seu nome: 
O endereço de email do seu amigo: