Descrição de Vaga



Código: 6741
Título da vaga: Analista JD– (Sênior)
Local: São Paulo,São Paulo
Região: Outra
Tipo de emprego:
Nível Profissional:
NÍvel Acadêmico: Ensino Superior Completo
Turno/Horas:
Habilidades: 1. Monitor, analyze, and triage cyber security alerts.
2. Take ownership of in scope cyber incident investigations (unless escalated to Tier 2 or Company in accordance with defined processes).
3. Create, manage, and follow up on service tickets.
4. Follow defined processes.
5. Correlate data from various sources made available by Company.
6. Assist WDT with guiding the appropriate remediation steps for cyber events via email, conference calls, phone calls, and instant messaging.
7. Design, create, and update documentation as directed by Company.
8. Research and analyze threat intelligence and indicators of compromise (IOC).
9. Identify security technology deficiencies and manage remediation.
10. Analyze malware using security technologies provided by Company.
11. Review logs, decipher false positives, and track incident investigations from start to finish.
12. Evaluate risk of cyber events and appropriate remediation.
13. Update service tickets and cases with investigation evidence.
14. Analyze emails for phishing or malicious content.
15. Retrieve and analyze host / endpoint and network artifacts.
16. Generate reports, graphs, summaries, metrics, dashboards, and other operational supportive documentation.
17. Identify root cause through cyber incident investigations.
18. Correlate vulnerability and patch data with cyber events.
19. Take ownership of in scope cyber incident investigations (unless escalated to Company in accordance with a mutually defined processes).
20. Mentor and support Tier 1 requests.
21. Analyze raw data feeds for anomalies.
22. Expand technical depth of evidence, documentation, artifacts, or investigations carried out by Tier 1.
23. Identify suspicious traffic.
24. Analyze malware to determine motivation, artifacts, risk, and any other components relative to supporting the cyber incident investigation.
25. Collect and analyze full packet captures.
26. Review and interpret firewall logs.
27. Collect and analyze memory from endpoint systems.
28. Design, create, and implement automation scripts provided by Company.
29. Design IOCs and alert correlations.
30. Awareness of recent threat intelligence and “zero day” attacks in the industry.
31. Identify virus outbreaks and manage containment and remediation efforts.
32. Design and improve protective and detective security technology controls.
33. Take control of endpoints identified as infected to perform remediation actions, such as running an antivirus, deleting files, closing the process, etc.

Categoria:
Remuneração Básica: -   - 
Benefícios: 0
Resumo da Vaga:
1. Monitor, analyze, and triage cyber security alerts.
2. Take ownership of in scope cyber incident investigations (unless escalated to Tier 2 or Company in accordance with defined processes).
3. Create, manage, and follow up on service tickets.
4. Follow defined processes.
5. Correlate data from various sources made available by Company.
6. Assist WDT with guiding the appropriate remediation steps for cyber events via email, conference calls, phone calls, and instant messaging.
7. Design, create, and update documentation as directed by Company.
8. Research and analyze threat intelligence and indicators of compromise (IOC).
9. Identify security technology deficiencies and manage remediation.
10. Analyze malware using security technologies provided by Company.
11. Review logs, decipher false positives, and track incident investigations from start to finish.
12. Evaluate risk of cyber events and appropriate remediation.
13. Update service tickets and cases with investigation evidence.
14. Analyze emails for phishing or malicious content.
15. Retrieve and analyze host / endpoint and network artifacts.
16. Generate reports, graphs, summaries, metrics, dashboards, and other operational supportive documentation.
17. Identify root cause through cyber incident investigations.
18. Correlate vulnerability and patch data with cyber events.
19. Take ownership of in scope cyber incident investigations (unless escalated to Company in accordance with a mutually defined processes).
20. Mentor and support Tier 1 requests.
21. Analyze raw data feeds for anomalies.
22. Expand technical depth of evidence, documentation, artifacts, or investigations carried out by Tier 1.
23. Identify suspicious traffic.
24. Analyze malware to determine motivation, artifacts, risk, and any other components relative to supporting the cyber incident investigation.
25. Collect and analyze full packet captures.
26. Review and interpret firewall logs.
27. Collect and analyze memory from endpoint systems.
28. Design, create, and implement automation scripts provided by Company.
29. Design IOCs and alert correlations.
30. Awareness of recent threat intelligence and “zero day” attacks in the industry.
31. Identify virus outbreaks and manage containment and remediation efforts.
32. Design and improve protective and detective security technology controls.
33. Take control of endpoints identified as infected to perform remediation actions, such as running an antivirus, deleting files, closing the process, etc.



Enviar este trabalho para um amigo
Seu nome: 
O endereço de email do seu amigo: