top of page

Security Operations Analyst (SIEM)

Writer's picture: IdealStaffsIdealStaffs

Role: Consultant

Client: United Nations Organization

Contract type: Freelancer / Self-Employed / B2B only

Location: Remote within EMEA timezone or on-site from Valencia

Duration: 6 months extensible

Visa sponsorship: Not available

Oncall 24/7: One week per month (rotation is subject to the number of team members)


 

To apply for this position, you can send your resume in English at office@idealstaffs.com referencing the job title.

 

Description:

The contractor will work under the supervision and guidance of the Head of Cyber Security

Operations unit in the area of information/cybersecurity, risk management consulting, and security operations activities in collaboration with a team of information and cyber security experts. Within the different activities performed by the team, you will focus mainly, but not exclusively, on the part related to the administration and engineering of SIEM platforms.


Duties and responasbilities:

• In close collaboration, build, adjust and implement analytics and detection rules for SIEM,

EDR and AV

• Under guidance, participate in cybersecurity architecture review of new or existing

technical solutions and provide recommendations for improvement

• Contribute to the preparation of KPIs for cybersecurity operations capabilities

• Monitor and investigate alerts leveraging Microsoft Security Tools (e.g. M365, Cloud App Security, Azure, Defender for Endpoint, Azure Security, Azure Sentinel and XDR)

• Monitor and triage AWS security events and detections

• Monitor and investigate alerts leveraging EDR solutions

• Work with alerts from the CSOC Analysts, to perform in depth analysis and triage of network security threat activity based on computer and media events, malicious code analysis, and protocol analysis

• Review trouble tickets generated by CSOC Analyst(s)

• Identify incident root cause and take proactive mitigation steps

• Assist with incident response efforts

• Work directly with cyber threat intelligence analysts to convert intelligence into useful detection rules

• Collaborate with incident response team to rapidly build detection rules and signatures as needed, as well as maintaining and improving existing detection rules

• Perform lessons learned activities

• Leverage emerging threat intelligence (IOCs, updated rules, etc.) to identify affected systems and the scope of the attack.

• Review and collect asset data (configs, running processes, etc.) on these systems for further investigation.

• Use strong TCP/IP networking skills to perform network analysis to isolate and diagnose

• Document actions in cases to effectively communicate information internally and to client

• Determine and direct remediation and recovery efforts

• Provide other ad hoc support as required.


Required Technical Skills:

• Deep knowledge of Microsoft Security Tools (e.g. M365, Cloud App Security, Azure, Defender for Endpoints, Azure Security, Azure Sentinel and XDR

• Deep Knowledge of Cloud technologies (e.g. Azure, AWS and GCP)

• Deep knowledge of SIEM tools like Splunk, QRadar, ArcSight, MS Sentinel, ELK Stack

• Knowledge of at least one EDR solution (MS Defender for Endpoint, SentinelOne, CrowdStrike)

• Knowledge of email security, network monitoring, and incident response

• Knowledge of Linux/Mac/Windows

• Knowledge of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols

• A minimum of five (5) years of relevant experience in information technology field, including triage of alerts and supporting security incidents

• Proven experience in reviewing raw log files, data correlation, and analysis (i.e. firewall, network flow, IDS, system logs)

• Proven experience on administering a SIEM platform, preferable either Splunk or Microsoft Sentinel SIEM

• Expert knowledge of English, both written and spoken, is required

• Proven knowledge of monitoring AWS environment (Iaas, Saas, Paas)

• Knowledge of at least one general-purpose or shell scripting language (e.g. Ruby, Bash, PowerShell, Python, etc.)


Required Soft Skills:

• Excellent communication skills

• Customer facing experience and oral communication skills

• Ability to write documentation & reports

• Creativity/ ability to find innovative solutions

• Willingness to learn on the job

• Conflict management & cooperation


Desirable certifications:

• Technical certifications: MCSE, CCNA, Microsoft Azure (e.g., SC-200), GCIH, CEH, GCFA or any GIAC/similar certification

• Relevant industry certifications



 

To apply for this position, you can send your resume in English at office@idealstaffs.com referencing the job title.

 

192 views0 comments

Comentarios


Los comentarios se han desactivado.
Post: Blog2 Post
bottom of page