Vaga de parceiro

Cyber Security Defense Analyst - São Paulo / SP

Disponível para Assinantes
Salvar nos Favoritos
  • Compartilhe:

Detalhes da Vaga

  • Escolaridade Não Informado
  • Segmento Não Informado
  • Salário Não Informado
  • Área de AtuaçãoDiversos / Outros

O que você irá fazer

  • ***Overview****Nearly every aspect of TD SYNNEX business is driven by Information Technology from inventory planning, logistics, order management, configuration, shipping, invoicing and settlement.
  • Our systems are a high transactional volume environment with a significant amount of our revenue derived through our eBusiness services.
  • ****We understand the importance of a system that works together.
  • Your expertise, drive and passion can help us improve everything we touch, from providers to customers as well as our employees.
  • Join our team of leaders to begin a rewarding career.
  • **Cyber Security Defense Analyst uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur within the network in order to protect information, information systems, and networks from threats.
  • The Cyber Security Defense Analyst recognizes corollary or potentially related events to identify trends and impacts to the organization''s security posture and proactively mitigates associated risks.
  • ****Responsibilities**- **Characterize and analyze logs, events and traffic to identify anomalous or malicious activity and potential threats to company resources.
  • **:- **Capture and analyze system and event logs associated with anomalous or malicious activities using security monitoring tools.
  • **:- **Collect intrusion artifacts and use discovered data to enable mitigation of potential cyber incidents within the enterprise.
  • **:- **Conduct research, analysis, and correlation across a wide variety of all source data sets including indications and warnings.
  • **:- **Security incident handling, and perform deep investigation.
  • **:- **Maintain a good understanding of the function and content of information security policies, standards, procedures, and practices as well as the threats, risks and vulnerabilities at a functional level.
  • **:- **Conduct periodic information security policy, standards, regulatory, and governance compliance reviews and testing and/or risk assessments throughout the organization and in accordance with the business plan.
  • **:- **Provide knowledgeable support to IT or business unit constituents in area of detection and protection of threats and provide support in case of incident**:- **Provide development effort as required.
  • Conduct training sessions and assist more junior staff in preparing for presentations and training sessions.
  • **:- **Ensure thorough validation of current and/or new policy, standards, regulatory, and compliance requirements.
  • **:- **Investigate opportunities to update security processes to sustain and enhance network and system security detection and protection capabilities**:- **Must be available for schedule work including providing on-call support****Qualifications/Education - Minimum Requirements**- **Typically has 4+ years relevant experience**:- **4-year degree in computer science or related field or equivalent experience****Critical Skills**- **Defensive Cyber Operations monitoring experience and execution of associated processes.
  • **:- **It must have a solid understanding of cyber defensive technologies required to protect, detect and respond to cyber threats and attacks.
  • Technologies include SIEM, vulnerability assessment, discovery, infrastructure (firewall, IPS/IDS, proxy, network capture), host based security, forensics, etc.
  • **:- **Use and implementation of IOCs across many platforms**:- **Excellent problem-solving and technical skills**:- **Sound analytical abilities.
  • **:- **Sound problem-solving skills.
  • **:- **Experience with ticketing and case management solutions**:- **Meticulous attention to detail**:- **Ability to multi-task, troubleshoot, and prioritize**:- **A deep understanding of how hackers work and ability to keep up with the fast pace of change in the criminal cyber-underworld**:- **Detail-oriented, self-motivated and disciplined, with excellent time management skills**:- **Ability to seek out vulnerabilities in IT infrastructures****Additional Knowledge & Skills**- **Previous work experience in a Security Operations Center**:- **Cyber Threat Intelligence**:- **Relevant security certifications (CISSP, CISA, GIAC, Security Plus)**:- **Automation and orchestration**:- **Scripting experience - Python, Powershell, etc.
  • **:- **Regular expressions**:- **Cloud and Office 365 Security Experience**:- **Proven hands-on experience with Security tools Intrusion Prevention, Endpoint Protection, Security Incident handling and threat hunting.
  • ****Cultural Competency Requirements:- **Within Tech Data diversity is one of our fundamental shared values.
  • We are a multi-

Informações Adicionais

  • Quantidade de Vagas 1
  • Jornada Não Informado