Compañía

Michael Page MéxicoVer más

addressDirecciónMexico
type forma de trabajoPermanente
CategoríaTecnologías de la información

Descripción del trabajo

Main/Key Responsibilities/Accountabilities
* Conducts network monitoring and intrusion detection analysis using various computer network defense tools, such as intrusion detection/prevention systems (IDS/IPS), firewalls, host-based security systems (HBSS), etc.
* Correlates network activity across networks to identify trends of unauthorized use
* Research emerging threats and vulnerabilities to aid in the identification of incidents
* Analyze the results of the monitoring solutions, assess, and correlate the output using automated systems. Conduct triage, event correlation, classification, and analysis of these events such that incidents are investigated and logged or followed up using the existing information risk incident management processes
* Provide pro-active feedback which will enable improvement of the current monitoring rules, based on information and knowledge/experience from the company and Industry best practices.
* Capable of working unsupervised, but able to interact and give direction to business and IT (Information Technology) teams in line within established corporate security policies and processes.
* Develops and maintains constructive and cooperative working relationships with team members
* Demonstrates the ability to drive creative, innovative ways to solve problems or minimize risk
* Consultative skills and ability to work cross-functionally
* Focused and results oriented
* Ability to react quickly, decisively, and deliberately in high-stress, high-impact situations
* Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate oneCyberSOC Analyst is a tiered position with immediate progression within the team, reporting directly to the corresponding Cyber Security Operations Center manager. The titles and duties for each tier are highlighted below:
CyberSOC Analyst | CyberSOC Analyst (T1 - Tier 1) is expected to:
* Demonstrate at least 2-3 of the skills listed in the "Technical Skill" section
* Triage security events, Following existing incident playbooks
* Contribute to the improvement and creation of playbooks
* Learn new skills across all technical domains
* Use public cyber security resources (e.g., sites/blogs/podcasts) to stay updated with latest news & threats
* Show a commitment to progress towards T2CyberSOC Engineer | CyberSOC Engineer (T2 - Tier 2) is expected to:
* Possess all skills required of a CyberSOC analyst (T1)
* In-depth knowledge of at least 5-6 of the skills listed in the "Technical Skill" section
* Be an Escalation point and Mentor for T1 Analysts
* Must be able to research, and communicate activities to detected security incidents in a timely manner
* Use advanced analysis skills to isolate and diagnose potential threats and anomalous behaviorLead CyberSOC Engineer | Lead CyberSOC Engineer (T3 - Tier 3) is expected to:
* Possess all skills required of a CyberSOC Engineer (T2)
* In-depth knowledge of most of the skills listed in the "Technical Skill" section
* Ability to perform basic malware reverse engineering
* Ability to perform memory analysis using tools such as Volatility or Rekall

* Leverage forensic tools such as FTK, X-Ways, SIFT as part of an investigation
* Use both internal and external threat intelligence to build threat detections and provide data enrichment
* Participate on Threat Hunting Activities
* Evaluate tools/solutions for investigation and IR (Incident Response)
* Ability to write scripts and Automate Detections and Mitigation Controls
* Conduct security gap analysis assessments, penetration testing / red-team assessments, and vulnerability assessments to identify security vulnerabilities
* Maintain and employ a strong understanding of advanced threats, continuous vulnerability assessment, response and mitigation strategies used in cybersecurity operations
* Be an Escalation Point and Mentor for T1 and T2 analysts

Incident Response - Security Risk|Cyberthreat intelligence

Qualifications/Requirements
Certifications (1 or more of the following required)
Current (not future/or planned) Certification are preferable
* SANS (SysAdmin, Audit, Network, and Security) GIAC (Global Information Assurance Certification) certification in Cyber Defense, Penetration Testing, Incident Response or Forensics
* Certified Information Systems Security Professional (CISSP)
* Certified Information Security Manager (CISM)
* EC-Council certification: CEH (Certified Ethical Hacker), ECSA (Certified Security Analyst), CHFI (Computer Hacking Forensic Investigator), CND (Certified Network Defender)
* Cisco Certified Network Associate (CCNA)

Technical Skills
1. Incident Response - Security Risk
* Strong troubleshooting and root cause analysis skills
* Cyber outbreak management and the ability to differentiate malicious activity from directed attack patterns
2. Security Event Monitoring and Analysis
* Log analysis/ Windows event analysis
* Security Information and Event Management (SIEM) - Chronicle and Splunk are preferred
3. Could Security
* Cloud experience (e.g., Azure, GC (Google Cloud), AWS (Amazon Web Services), Alibaba Cloud, Yandex, G42)
4. Endpoint
* Antivirus solutions (e.g., Microsoft Defender)
* Strong Windows and Linux administration experience
* Information Security tools & packet analyses tools (e.g., Cb, Wireshark)
5. Network Security
* Firewall (e.g., Pato Alto Networks)
* Internet Protocols and Services (e.g., TCP/IP, FTP (File Transfer Protocol), HTTPS, SSH (Secure Shell))
* Intrusion Detection (e.g., IDS/IPS tools)
* Network scanning tools (e.g., NMAP)
* Networking infrastructure (Cisco is preferred)
* Information Security tools & packet analyses tools (e.g., Cb, Wireshark)
6. Identity & Access Management
* Azure Active Directory
* Cloud Access Security Broker (CASB)
* Federation
* Conditional Access
* Zero Trust
7. Forensics
* Malware analysis and memory analysis
* Network and Host forensics
8. Email security
* Phishing detection tools (e.g., Proofpoint TRAP, CLEAR)

9. Threat Intel
* Experience in analyzing threat intel feeds.
10. OT/IIoT Security
* Awareness of SCADA (Supervisory Control and Data Acquisition) / IIoT (Industrial Internet of Things) technologies
11. Data Security
* Data Loss Prevention tools, (e.g., AIP (Azure Information Protection), IRM (Information Rights management))
12. Compliance and Audit
* Fair understanding of the NIST (National Institute of Standards and Technology) CS (Cyber Security) Framework
13. Vulnerability Management
* Vulnerability Testing tools (e.g., Qualys, Kali)
14. Scripting/Automation
* Programming/Scripting tools (e.g., Python, Bash, PowerShell, YARA-L)
15. Application Security
* Fair understanding of the threat modeling
16. Project Management
* Basic project management experience
17. Common Technical Skills
* SharePoint and PowerBI experience are an advantage
* YARA-L, PowerShell or Python coding experience is an advantageOverall Position Requirements
* Bachelor's or master's degree in a technical field such as computer science, Cyber Security, Management Information Technology, Engineering, and Mathematics is strongly preferred
* Information Security Experience:
o For T1: 1-2 years (or appropriate internships in CS if fresh out of college)
o For T2: 3-5 years (IR or SOC (Security Operation Center) experience highly desired)
o For T3: 5-10 years
* Must be able to work flexible hours including early/late shift, weekends, and public holiday
* Fluent in English
* Ability to read and understand additional languages is a strong advantage
* Effective communication skills
* Must possess excellent work habits, a strong work ethic, and be able to adhere to company work hours, policies, and standard business etiquette
* Ability to work under stress and resilience to support extended work shifts infrequently (during Cyber Operations)
* Keen to follow a self-driven learning and development plan

Global oilfield services company

  • 30 day Christmas bonus
  • 15 day vacation
  • 85% prima vacacional
  • Remote scheme
  • Savings fund 10% capped by law
  • $2,200 food vouchers
  • Pension plan
  • Major medical insurance (family plan)
  • Dental and visual
  • Life Insurance
  • Stock Purchase Plan
Refer code: 1041760. Michael Page México - El día anterior - 2024-03-12 07:21

Michael Page México

Mexico

Compartir trabajos con amigos

Trabajos relacionados

Cybersoc Engineer/Analyst (Remote)

Demand Planning Analyst II

Sensata Technologies, Inc.

Aguascalientes, Ags.

hace un mes - visto

Logistics Analyst

Tenneco Us

Celaya, Gto.

hace un mes - visto

(CEN) GLOBAL TRANSFER PRICING ANALYST

Cemex

San Pedro Garza García, N. L.

hace un mes - visto

(CEN) INTERNAL CONTROL ANALYST

Cemex

San Pedro Garza García, N. L.

hace un mes - visto

Sr Analyst, FP&A

Warner Bros. Discovery

Paid

Mexico City, Mexico

hace un mes - visto

Client Advocacy Analyst

Global Payments

Cuajimalpa de Morelos, CDMX

hace un mes - visto

Network Analyst

Global Payments

Cuajimalpa de Morelos, CDMX

hace un mes - visto

SC Finance Sr. Analyst

Pepsico

Miguel Hidalgo, CDMX

hace un mes - visto

Demand Planning Analyst II

Sensata

Aguascalientes, Ags.

hace un mes - visto

Benefits Sr Analyst

Citigroup

Ciudad de México

hace un mes - visto

Customer Service Sr Analyst - Middle Office

Citigroup

Ciudad de México

hace un mes - visto

Data Analyst

Workday

Guadalajara, Jal.

hace un mes - visto

Data Analyst - LCM

Rappi

Ciudad de México

hace un mes - visto

Business Intelligence Analyst

Tetra Pak

Lund, SE

hace un mes - visto

IT Analyst - CSV

Eli Lilly And Company

Location Lebanon, Indiana, United States of America

hace un mes - visto

Associate – Master Data Analyst-SAP

Eli Lilly And Company

Location Lebanon, Indiana, United States of America

hace un mes - visto

IT Business Analyst MES

Mx18 Essity Higiene Y Salud Mexico

Monterrey, N. L.

hace un mes - visto