SOC L3 Analyst/Consultant



Nº Vacantes (puestos):



We are looking for people with technical education (Bachelor`s degree in Computer Science, a related field, or equivalent) with minimum 4 year of experience monitoring security events in L2-L3. Fluent in English and Spanish will be necessary.

Candidates who provide understanding of incident management cycle would be ideal, as well as necessary experience and knowledge of:

– SIEM: MS Sentinel.

– EDR: SentinelOne / MS Defender (I would need one of them).

– WAF: Imperva.

– CASB: MS CloudApps.

– Phishing analysis (desirable: CofenseTriage/Proofpoint TAP).

– Security elements (IDS-IPS/Firewall/Palo Alto/Fortinet).

– Knowledge of Windows security events.

– Ticketing: ServiceNow.


– Review and analyze events from various security devices (NIDS, HIDS, IDS, IPS, firewall, WAF, SIEM etc.). Level 2-3 of incidents.

– Communicate any suspicious activity, incident or alert and follow up from their initial treatment to their solution.

– Manage automatic vulnerability analyses (Nessus, Acunetix, WPScan, others).

– Identify, analyze and program security alerts.

– Contribute mantaining company´s infrastructures.

– Support the SIEM, learn, adapt and document its (very) rapidly evolving environment.

– Analyse, troubleshoot, and remediate issues with the SIEM and with the log collectors and network sensors.

– Develop and upgrade Azure Sentinel’s workbooks, analytic rules, reports, log parsers and integrate correlation logic to the Incident Response processes.

Se ofrece:

What are we offering?
Type of contract: indefinite full-time contract (from Monday to Friday).

Location: Indifferent (total or hybrid remote).

Salary: to determinate.

Flexible Compensation Plan (food card, transport card, medical insurance, kindergarten voucher, and training).

Work Life Balance: flexible work environmen

Inscribirme en esta oferta