Listing Description
The candidate should have one or more of the below listed experiences.
Technical Skills
1. Cyber Security Analyst in SOC (Security Operation Center) more than 2 years of experience
2. Micro-focus ArcSight Administrator, experience more than 1 years (Installation, configuration, smart connector, creating content as rules, dashboards, reports, flex connectors)
3. IBM Qradar Administrator, experience more than 1 years (Installation, configuration, data sources, creating content as rules, dashboards, reports)
4. Alienvualt USM AnyWhere or Alienvualt USM Appliance Administrator, experience more than 1 years (Installation, configuration, data sources, creating content as rules, dashboards, reports)
5. Splunk Enterprise Security Administrator, experience more than 1 year (Installation, configuration, data sources, creating content as rules, dashboards, reports)
6. Elastic Search Administrator, experience more than 1 year (Installation, configuration, data sources, creating content as rules, dashboards, reports)
7. RSA ECAT (or equal vendor) investigator for more than 1 year of experience.
8. VMware CarbonBlack (or equal vendor) investigator for more than 1 year of experience.
Soft Skills
1. Attention to detail and ability to recognize and resolve discrepancies
2. Strong written and verbal communication skills
3. Self-motivated, enthusiastic, team player willing to work independently as well as cross-functionally
4. Ability to multi-task and prioritize
5. Ability to speak Portuguese is an Advantage1. Manage the scoping, containment, remediation, reporting, of Incidents within our customers infrastructure.
2. Provide guidance on control implementation for post-incident risk reduction.
3.Support the ongoing development of the SIEM environment and Use Case development.
4. Support our Cyber Security Incident Response Team.
Listing Details
- Citizenship: No Requirements
- Incentives: Not Provided
- Education: No Requirements
- Travel: No Travel
- Telework: No Telecommute