PbAbout the Job /b /ppbr/ppProfessionals at Ackcent Cybersecurity have a common goal: to improve the security of our customers, protect their assets from cyber threats and to provide a high-quality service through communication and care for our customers. /ppbr/ppIn this position you will be part of our SOC Team in charge of security threat monitoring and incident handling, you will be helping to secure and defend our clients’ assets. /ppbr/ppWe are looking for professionals with experience in cybersecurity and with a wide and deep understanding about Networks, Security Architecture and Security Monitoring Tools. /ppbr/ppAs a key member of the Ackcent team, you will be in charge leading the handling of security threats and incidents, improving and maintaining tools and procedures and conducting forensics and malware analysis for further mitigation and threat containment. As a senior position you will be able to train and support other junior team members and will be involved alongside other Ackcent departments in different initiatives and decisions regarding internal and external Security Services. /ppbr/ppbKey /b bResponsibilities /b /ppbr/pulliAnalysis and verification of security threat monitoring alerts to produce incident identification, classification and prioritization. /liliCreate, improve and maintain security monitoring alerts based on correlation of different sources of data. /liliOperate and maintain various IDS/IPS working close with security/network architects to take security monitoring and defenses to the next level. /liliLead the response to security incidents and investigations working close with customers and IT providers, following SLA requirements. /liliConduct forensics/malware analysis to extract indicators of compromise for further mitigation and containment, evaluating incident scope and impact. /liliReport to the SOC Manager and the customer involved CISO/CIO. /liliAdvice and train junior team members. /liliProactive monitoring on cyber threat landscape by performing research and study on latest security threats and vulnerabilities to ensure operational tools and processes are up to date. /liliEnsuring contractual obligations are met and SLAs are met or exceeded. /liliManage priorities, deadlines and deliveries. /liliManage and create improvements and procedures regarding SOC Tools and Operations. /li /ulpbr/ppbRequired Skills Experience /b /ppbr/pulliComputer/Telecommunications Engineering degree or a related discipline. /liliMore than 3 years of relevant experience in the field of information security. /liliExperience working in a Security Operations Centre (SOC) environment. /liliStrong technical understanding of network fundamentals and common Internet protocols. /liliKnowledge of system administration and security architecture. /liliKnowledge of the main security monitoring tools (FW, IDS/IPS, HIDS, WAF, SIEM). /liliExperience or proven knowledge of at least one IDS technology. /liliScripting in Bash, Python or PowerShell. /liliFluent in English (written and spoken). /liliSelf-motivated with the ability to work independently and as a team member in a challenging environment. /li /ulpbr/ppbNice to have /b /ppbr/pulliProficient in understanding Operating Systems and their architecture: Windows, Unix/Linux, and OSX Operating Systems. /liliWindows server administration knowledge. /liliGood understanding of Cyber security landscape: Cyber kill chain, TTP, Threat Intelligence ad malware distribution networks. /liliGood understanding of information security concepts: defense in depth, BYOD management, data loss protection, risk assessment and security metrics. /liliThree or more years working in a Security Operations Center (SOC) environment. /liliStrong analytical and problem-solving skills. /liliStrong communication, presentation, and leadership skills along with the ability to work in a highly collaborative environment. /liliExhibits initiative, follow-up and follow through with commitments. /liliManages multiple priorities in a high-pressure environment. /liliExperience working with AWS or Azure infrastructure. /liliPrevious experience with malware reverse engineering. /liliRelated Certification (GCIH, GCFA, GCFE, GREM, CISSP) is a plus. /li /ulpbr/ppbWhat we offer /b /ppbr/pulliCompetitive salary /liliMedical insurance /liliRemote work /liliBirthday day off /liliFlexible working hours /liliA dynamic work environment where innovation and collaboration are at the core /li /ulpbr/ppbr/p