Identify, log and triage events (filtering out false positives); analyze according to metrics and market-standard categorizations
Collect evidence (technical and detailed information related to detected events, including timestamps, attack paths, and involved assets)
Notify and recommend containment, eradication, and/or recovery actions in accordance with predefined procedures agreed with the Information Security area and with mitigation recommendations provided by the Anti-DDoS tool
Notify and recommend mitigation actions to responsible teams via ticketing and, when necessary due to event criticality, by phone contact
Mitigate attacks following best practices, monitor self-mitigation, and communicate attack details to the customer
Notify the Information Security and/or Data Privacy area depending on event criticality
Handle incidents using knowledge-base documentation and within the agreed service level
Prepare customized reports
Requirements
University degree
Basic English
Experience participating in projects in Information Security or Cybersecurity within MSS/SOC
Experience working with Anti-DDoS technology
Experience handling offenses related to attacks against infrastructure, networks, and applications
Experience analyzing logs and collecting evidence to support containment actions for potential incidents
Cybersecurity certification such as CSSLP (Certified Secure Software Lifecycle Professional) or equivalent (preferred)
Knowledge of computer networks—protocols, services, and network traffic collection and analysis (preferred)
Knowledge related to operating system architectures (Windows and Linux) (preferred)