SOC Analysts, Tier 1/2, REMOTE work, 6 month +

WaveTel

Posted on Jun 6, 2024 by WaveTel
Not Specified, Portugal
IT
15 Jul 2024
€4.5k - €5k Annual
Contract/Project - Remote

SOC Analysts, Tier 1/2, REMOTE work, 6 month +

For our Client in Portugal (A Major Mobile Vendor), we are searching for a team of SOC Analysts, Tier 1/2

REMOTE WORK, 6 month, extension expected

Start date: 15.07.2024
End date: 14.01.2025
Monthly rate: 4500 - 5000 Euro

Job Description:
We are searching for a Tier 1/2 SOC Analyst possessing a comprehensive skill set to enhance the security posture of our organization.
The analyst will be responsible for SIEM monitoring, incident triaging, security incident management, providing security remediation and advisory to stakeholders, and leveraging their expertise in antivirus, IDS/IPS, and knowledge of frameworks such as the Cyber Kill Chain and MITRE ATT&CK.

Additionally, the analyst should be adept in handling cloud workloads and have experience with tools like:
Azure Sentinel, Microsoft Defender, Symantec antivirus, and Kusto query language.

Type of Work
All tasks will be performed remotely, utilize tools and access to relevant systems and resources.
The analyst will be responsible for Real Time monitoring, incident response, take proactive security measures, as well as coordinating security incident resolutions/remediations and resolution validations with various stakeholders within the organization.
Candidate will be expected to work normal workday hours for its time region, excluding weekends.

Profile of Contractor
The ideal candidate should possess:

Demonstrable experience in SIEM monitoring, incident triaging, and security incident management.
Proven ability to provide security remediation and advisory services to stakeholders.
Expertise in antivirus, IDS/IPS, and familiarity with the Cyber Kill Chain and MITRE ATT&CK framework.
Strong analytical skills with the capability to identify and mitigate security risks effectively.
Experience with cloud workloads Azure, GCP and/or AWS and proficiency in utilizing tools such as Azure Sentinel, Microsoft Defender, Symantec antivirus, and Kusto query language.
Excellent communication skills to effectively collaborate with cross-functional teams and articulate security-related concepts to both technical and non-technical stakeholders.

Timeline of Engagement
The engagement is for a total of 6 months.
During the first month the focus will be on getting a good understanding of the day-2-day mode of operation, tooling, and the environment itself, according to a predefined onboarding schedule. In the 2nd month, the candidate will be released into operational activities, accompanied by a selected member of the existing team.
Findings will be shared with the team coordinators and/or CDC Ops lead dedicated sessions.

Deliverables
The contractor will be expected to deliver the following:

Regular reports on SIEM monitoring activities, incident triaging, and security incident management.
Recommendations for security remediation and advisory to stakeholders
Documentation of incidents, including root cause analysis and lessons learned.
Implementation of proactive detection improvements
Deliver process-based solutions and/or improvements, to enhance internal capabilities in security operations.

Please send CV in English, and include a reference if possible


Reference: 2772316183

https://jobs.careeraddict.com/post/91535135

This Job Vacancy has Expired!

WaveTel

SOC Analysts, Tier 1/2, REMOTE work, 6 month +

WaveTel

Posted on Jun 6, 2024 by WaveTel

Not Specified, Portugal
IT
15 Jul 2024
€4.5k - €5k Annual
Contract/Project - Remote

SOC Analysts, Tier 1/2, REMOTE work, 6 month +

For our Client in Portugal (A Major Mobile Vendor), we are searching for a team of SOC Analysts, Tier 1/2

REMOTE WORK, 6 month, extension expected

Start date: 15.07.2024
End date: 14.01.2025
Monthly rate: 4500 - 5000 Euro

Job Description:
We are searching for a Tier 1/2 SOC Analyst possessing a comprehensive skill set to enhance the security posture of our organization.
The analyst will be responsible for SIEM monitoring, incident triaging, security incident management, providing security remediation and advisory to stakeholders, and leveraging their expertise in antivirus, IDS/IPS, and knowledge of frameworks such as the Cyber Kill Chain and MITRE ATT&CK.

Additionally, the analyst should be adept in handling cloud workloads and have experience with tools like:
Azure Sentinel, Microsoft Defender, Symantec antivirus, and Kusto query language.

Type of Work
All tasks will be performed remotely, utilize tools and access to relevant systems and resources.
The analyst will be responsible for Real Time monitoring, incident response, take proactive security measures, as well as coordinating security incident resolutions/remediations and resolution validations with various stakeholders within the organization.
Candidate will be expected to work normal workday hours for its time region, excluding weekends.

Profile of Contractor
The ideal candidate should possess:

Demonstrable experience in SIEM monitoring, incident triaging, and security incident management.
Proven ability to provide security remediation and advisory services to stakeholders.
Expertise in antivirus, IDS/IPS, and familiarity with the Cyber Kill Chain and MITRE ATT&CK framework.
Strong analytical skills with the capability to identify and mitigate security risks effectively.
Experience with cloud workloads Azure, GCP and/or AWS and proficiency in utilizing tools such as Azure Sentinel, Microsoft Defender, Symantec antivirus, and Kusto query language.
Excellent communication skills to effectively collaborate with cross-functional teams and articulate security-related concepts to both technical and non-technical stakeholders.

Timeline of Engagement
The engagement is for a total of 6 months.
During the first month the focus will be on getting a good understanding of the day-2-day mode of operation, tooling, and the environment itself, according to a predefined onboarding schedule. In the 2nd month, the candidate will be released into operational activities, accompanied by a selected member of the existing team.
Findings will be shared with the team coordinators and/or CDC Ops lead dedicated sessions.

Deliverables
The contractor will be expected to deliver the following:

Regular reports on SIEM monitoring activities, incident triaging, and security incident management.
Recommendations for security remediation and advisory to stakeholders
Documentation of incidents, including root cause analysis and lessons learned.
Implementation of proactive detection improvements
Deliver process-based solutions and/or improvements, to enhance internal capabilities in security operations.

Please send CV in English, and include a reference if possible

Reference: 2772316183

CareerAddict

Alert me to jobs like this:

Amplify your job search:

CV/résumé help

Increase interview chances with our downloads and specialist services.

CV Help

Expert career advice

Increase interview chances with our downloads and specialist services.

Visit Blog

Job compatibility

Increase interview chances with our downloads and specialist services.

Start Test