Descrição do trabalho
Your Mission:
Join our cybersecurity team and help us defend against digital threats! You'll be the go-to expert for complex incidents, detection rules, automation, and more. Ready to make an impact?
Your Responsibilities Include:
- Be the escalation point for complex incidents
- Conduct RCA and recommend mitigation actions
- Develop detection rules using MITRE ATT&CK
- Automate responses with playbooks (e.g., Azure Sentinel)
- Implement and monitor IAM, EDR, DLP, and cloud protections
- Guide SOC tasks and ensure technical alignment
- Continuously improve incident response processes
- Perform vulnerability assessments and coordinate fixes
- Analyze logs and detect anomalies using KQL
- Support crisis management during critical incidents
- Write detailed technical reports
- Enhance SOC visibility through data integration
You Must Have:
- Degree in Information Security or Cybersecurity
- 4+ years in cybersecurity (2+ in incident/team management)
- Fluent in English (written & spoken)
- Experience with SIEM (Microsoft Sentinel, Splunk, QRadar)
- Experience with EDR (SentinelOne, CrowdStrike, Defender)
- Familiarity with Vulnerability Management tools (Rapid7, Tenable)
- Cloud security experience (especially Azure)
- Leadership and team management skills
- Strong communication and documentation skills
- Critical thinking and analytical mindset
Nice to Have:
- International experience
- Certifications: Security+, SC-200, SC-100, AZ-500
Ready to take your cybersecurity career to the next level?
Apply now: