¡Activa las notificaciones laborales por email!

Operations Security Analyst

Trigyn Technologies

Madrid

A distancia

EUR 50.000 - 70.000

Jornada completa

Hoy
Sé de los primeros/as/es en solicitar esta vacante

Genera un currículum adaptado en cuestión de minutos

Consigue la entrevista y gana más. Más información

Descripción de la vacante

A global cybersecurity firm is looking for a Security Operations Analyst to work remotely. This role requires expertise in monitoring AWS security events, analyzing security logs, and using various Microsoft security tools. Ideal candidates will have at least five years of IT experience and solid knowledge in incident response, with strong communication skills in English.

Formación

  • A minimum of five years of relevant experience in the information technology field.
  • Expert knowledge of English, both written and spoken, is required.
  • Knowledge of email security, network monitoring, and incident response.

Responsabilidades

  • Monitor and triage AWS security events and detections.
  • Review security events in a Security Information and Event Management (SIEM) system.
  • Analyze network and host-based security appliance logs.

Conocimientos

AWS security events monitoring
Microsoft Security Tools
SIEM tools
Incident response
Scripting languages
Network monitoring
Linux/Mac/Windows knowledge
Cloud technologies
Communication in English

Herramientas

Splunk
QRadar
ArcSight
MS Sentinel
ELK Stack
Descripción del empleo

Trigyn has a contractual opportunity for a Security Operations Analyst. This resource will be working Remotely.

The incumbent will work under the supervision and guidance of the Head of Cyber Security

security, risk management consulting, and security operations activities in collaboration with a team of information and cybersecurity experts.

The resource will be part of the 24x7 Security Operations Centre (CSOC) and will work in close collaboration with team members distributed around the globe to monitor, detect, triage, investigate and respond to cyber threats targeting its Clients and Partner Organizations.

Monitor and investigate alerts leveraging Microsoft Security Tools (e. g. M365, Cloud App Security, Azure, Defender for Endpoint, Azure Security, Azure Sentinel and XDR)

Responsibilities & Qualifications
  • Monitor and triage AWS security events and detections
  • Review security events that are populated in a Security Information and Event Management (SIEM) system
  • Analyze a variety of network and host‑based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) Integrate and share information with other analysts and other teams
  • Knowledge of Transmission Control Protocol / Internet Protocol (TCP / IP) protocols
  • Deep knowledge of Microsoft Security Tools (e. g. M365, Cloud App Security, Azure, Defender for Endpoints, Azure Security, Azure Sentinel and XDR)
  • Deep Knowledge of Cloud technologies (e. g. Azure, AWS and GCP)
  • Deep knowledge of SIEM tools like Splunk, QRadar, ArcSight, MS Sentinel, ELK Stack
  • Knowledge of email security, network monitoring, and incident response
  • Knowledge of Linux / Mac / Windows;
  • A minimum of five (5) years of relevant experience in the information technology field, including triage of alerts and supporting security incidents
  • SIEMs, EDRs), able to autonomously perform technical analysis of security threats and collaborate with the Incident Response team
  • Extensive Windows, Linux, Database, Application, Web server, etc. log analysis
  • Expert knowledge of English, both written and spoken, is required
  • Knowledge of at least one general‑purpose or shell scripting language (e. g. Ruby, Bash, PowerShell, Python, etc.)

Proven knowledge of monitoring AWS environment (IaaS, Saas, Paas)

MCSE, CCNA, Microsoft Azure (e. g.,

Consigue la evaluación confidencial y gratuita de tu currículum.
o arrastra un archivo en formato PDF, DOC, DOCX, ODT o PAGES de hasta 5 MB.