Respond to alerted security events with expert analysis to support incident identification, response, resolution, and post-incident investigations.
Operate security controls and platforms including firewalls, endpoint detection and response (EDR), intrusion prevention, malware protection, data leakage prevention, vulnerability management, access control, and event monitoring.
Identify and analyze logs, artifacts, and evidence from multiple sources to validate, scope, and document incidents.
Secure and preserve evidence (physical and logical) using sound handling practices.
Coordinate with internal and external stakeholders to support global forensics and investigation processes.
Propose and implement improvements to technical safeguards (tools/technologies) and associated procedures and processes.
Develop and document operational procedures and metrics; produce management information reports to drive ongoing improvements.
Leverage vulnerability assessment and threat intelligence outputs to strengthen the security safeguards landscape.
Requirements
Experience in Cybersecurity Incident Response, a Security Operations Center (SOC), or a related Information Security function.
Strong working knowledge of IT infrastructure and technologies (networks, databases, processing systems, web applications, mobile, cloud, big data, virtualization).
Working knowledge of cybersecurity principles, protocols, and technologies (encryption, authentication, access control, intrusion detection, attack patterns, network security).
Excellent communication across countries and cultures; strong collaboration and teamwork.
High attention to detail; ability to multitask, work independently, and drive change.
Proven discretion and ability to handle highly sensitive information with confidentiality.
Experience estimating/planning work effort and managing delivery risks and issues.
Commitment to continuous professional development.
Bachelor’s degree in Computer Science, Computer Engineering, or Information Technology.