¡Activa las notificaciones laborales por email!
Mejora tus posibilidades de llegar a la entrevista
Elabora un currículum adaptado a la vacante para tener más posibilidades de triunfar.
Join a leading Managed Cloud Provider that is transforming the industry with innovative technology solutions. As an Analyst Tier 1, you will play a crucial role in managing the Alert queue, ensuring timely responses to security incidents while collaborating with a global team. This position offers a unique opportunity to develop your skills in cybersecurity, working alongside experienced professionals in a dynamic environment. Enjoy flexible working hours, competitive compensation, and a culture that values your contributions. If you're ready to take on new challenges and grow your career, this is the place for you!
Syntax is a leading Managed Cloud Provider for Mission Critical Enterprise Applications and has been providing comprehensive technology solutions to businesses of all sizes since 1972. Syntax has undisputed strength to implement and manage ERP deployments (Oracle, SAP) in a secure and resilient private, public or hybrid cloud. With strong technical and functional consulting services, and world-class monitoring and automation, Syntax serves some of North America’s largest corporations across a diverse range of industries. Syntax has offices worldwide, and partners with Oracle, SAP, AWS, Microsoft, IBM and other global technology leaders.
Analyst Tier 1 is responsible for managing the Alert queue for their designated team. This includes ensuring that alerts are processed within the SLA designated in the customer contract as well as ensuring communication for escalations is handled to the appropriate member of the SOC organization or appropriate customer or internal organization according to established style guides.
The analyst is expected to document and communicate a basic level of descriptive analysis indicators to assist customers and incident responders in reducing the dwell time of threats in the customer's environment as well as assisting in reducing then overall risk to the organization and customers. Analysts are also expected to begin developing their own processes and workflows which can assist in refining and improving SOC functions.
The analyst will develop an understanding of developing and maintaining threat models to assist in threat intelligence collections and threat hunts as well as use case development to disrupt adversarial activity more effectively. Additionally, that analyst will be mentored by senior analysts and team specialists to assist in developing a foundational understanding of Vulnerability Management, Cyber Threat Intelligence and Threat Hunting, Incident Response and Threat Emulation, as well as packet analysis and the fundamentals of Forensic Collections and Analysis.
Competencies
An analyst 1 candidate should be able to demonstrate competency in the following areas: