Attiva gli avvisi di lavoro via e-mail!

Security Incident Specialist

Experteer Italy

Milano

In loco

EUR 50.000 - 70.000

Tempo pieno

30+ giorni fa

Aumenta le tue possibilità di ottenere un colloquio

Crea un curriculum personalizzato per un lavoro specifico per avere più probabilità di riuscita.

Descrizione del lavoro

A leading company seeks a Security Incident Specialist to manage and investigate security incidents, implement Azure Security Solutions, and enhance cybersecurity practices. The role requires strong analytical skills, a cybersecurity degree, and effective communication abilities.

Servizi

Stimulating international environment
People-centric approach
Growth opportunities

Competenze

  • 3+ years as a SOC analyst or 5+ years with an undergraduate degree.
  • Excellent written and verbal English skills.

Mansioni

  • Lead incident response efforts and coordinate Azure Security Solutions.
  • Develop and refine policies for enhancing Security Incident Management.
  • Write clear incident reports for both technical teams and executives.

Conoscenze

Incident investigations and response
Malware analysis
Phishing analysis
Communication
Curiosity

Formazione

Master/Bachelor Degree in cybersecurity
Undergraduate with 5+ years as a SOC analyst

Strumenti

SIEM/SOAR (Sentinel)
Azure Security Solutions
Secops scripting (bash, vbscript, Powershell, python)

Descrizione del lavoro

R0001210 Security Incident Specialist (Open)

We’re Nadara. We work harmoniously with the power of nature and the communities around us to power lifetimes to come. We call our approach ‘living energy’.

We don’t just produce renewable energy, we live it – recognising our relationship with the people touched by our business and supporting social, educational, cultural, and environmental initiatives that contribute to the development of the communities we work alongside.

Discover more about our business here:

Nadara is an innovative place to work. We work in a stimulating and challenging environment, where every day we explore the unknown with curiosity, make decisions with quality and take action and deliver with courage. For us diversity is a real value, and we encourage connecting different perspectives with respect.

Discover more about our culture and approach here:

Job Description Summary:

The Security Incident Specialist is responsible for ensuring robust incident management by investigating and addressing security incidents reported by or assigned to the SOC. This role involves leading incident response efforts, escalating issues to designated owners when necessary, and coordinating the implementation of Azure Security Solutions, including Azure DLP, Defender, and Defender for Cloud. Additionally, the specialist will support the development and refinement of policies and procedures to enhance Security Incident Management and Cybersecurity practices.

Job Description:

The Security Incident Specialist is responsible for ensuring robust incident management by investigating and addressing security incidents reported by or assigned to the SOC. This role involves leading incident response efforts, escalating issues to designated owners when necessary, and coordinating the implementation of Azure Security Solutions, including Azure DLP, Defender, and Defender for Cloud. Additionally, the specialist will support the development and refinement of policies and procedures to enhance Security Incident Management and Cybersecurity practices.

Reporting to the Cybersecurity Manager, the Security Incident Specialist is responsible for maintaining, measuring, and improving the overall Incident Management process within the assigned scope, budget, and timeline. Key responsibilities include:

  • Demonstrating familiarity with Microsoft Security Solutions (Defender, Sentinel, Azure, Entra, etc.).
  • Implementing Azure Security Solutions to strengthen the organization's security posture and optimize incident handling processes.
  • Maintaining and developing the company’s security monitoring systems and ensuring efficient SIEM ingestion (Sentinel).
  • Ensuring the proper collection of logs, alerts, and incidents for effective monitoring and response.
  • Reviewing and developing analytics and playbooks for incident classification, assignment, and response automation.
  • Reporting the status and outcomes of incidents and investigations to company stakeholders.
  • Writing clear and comprehensive incident reports, combining logs and evidence, tailored for both C-level executives and technical teams.
  • Coordinating the Incident Management process with Vulnerability Management to ensure cohesive security operations.
  • Supporting initiatives to enhance secure architectures, reducing the potential threat landscape.
  • Aligning the Incident Management process with organizational policies, procedures, and security guidelines.

Key Requirements:

Master/Bachelor Degree in cybersecurity or computer science with 3+ years as a SOC analyst, or undergraduate with 5+ years as a SOC analyst.

Excellent practice in:

  • SIEM/SOAR (Sentinel) maintenance and development
  • Log collection, analysis, and correlation
  • Incident investigations and response
  • Malware analysis
  • Phishing analysis
  • File system checks and memory dumps
  • Ioc editing and searching

Good practice in:

  • Evidence acquisition and retention
  • Secops scripting (bash, vbscript, Powershell, python)
  • Threat intelligence and OSINT
  • Supporting cybersecurity policies and procedures, especially Security Incident Management

Eager to learn with a curious mind to find threats, discover backdoors, identify attack vectors, talented in building and demonstrating samples from scratch.

Highly effective communication skills, capable of presenting data clearly to various audiences.

Excellent written and verbal English skills.

Ability to work within complex teams and in an international environment.

Desirable Certifications include: Blue Team Level 1 (BTL1), Blue Team Level 2 (BTL2), eCTHP, eCIR, GCIH, SC-200, AZ-500, AZ-900, Certified CyberDefender (CCD) or similar.

Experience in cybersecurity governance, including policy development, frameworks, and compliance strategies.

What do we offer?

  • A stimulating international environment. You will never get bored!
  • People-centric approach. This is our one and only way of thinking!
  • Stimulating challenges and growth opportunities.
  • The possibility to work in a team where people are passionate about their job.

Location:

Lisbona

Time Type:

Full time

Worker Subtype:

Regular

Ottieni la revisione del curriculum gratis e riservata.
oppure trascina qui un file PDF, DOC, DOCX, ODT o PAGES di non oltre 5 MB.