SOC Analyst Opportunity

opus spark company

Subscribe to our Telegram & Twitter Channel

SOC Analyst in ARGENTINA

Remote 10 months ago

Exciting Opportunity for Cyber Security Enthusiasts!


Are you passionate about protecting valuable data and information systems in today’s data-driven world? Join a dynamic global team that focuses on safeguarding information assets located in Argentina. This position offers 100% remote work flexibility and the chance to work with a firm recognized for its excellence in cybersecurity.


  • Cyber Triage and Investigation
  • Opportunity for growth within a prestigious organization
  • Remote position based in Argentina
  • Work with cutting-edge technology in a collaborative environment


We are currently seeking candidates for the role of Cyber Triage and Forensics - Security Analyst, where you'll have the chance to work alongside talented cybersecurity experts, gaining exposure to a variety of technologies and security tools while also having ample opportunities for career growth. There's potential for Higher level depending on experience!


The shift is Sunday to Wednesday or Wednesday to Saturday from 12 PM to 11 PM Argentina time.


Key Responsibilities:

  • Perform front line accurate and precise real-time monitoring and analysis correlation of logs/alerts from a multitude of security devices with a focus on the determination of what was said as events constitute security incidents.
  • Work multi-functionally to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations.
  • Work at a technical level, be capable of identifying threats and vectors that cause security events and be able to follow defined procedures for mitigating said threats.


Skills and attributes for success:

  • How to respond to network and host-based security events
  • Ability to participate in detecting, investigating, and resolving security events
  • Capable of working independently
  • Identify and propose areas for improvement within the Cyber Triage and Forensics
  • Good interpersonal skills


Qualification:

  • Bachelor’s in Computer Science, Information Systems, Engineering or 2 - 3 years of related work experience.
  • Minimum of 1-2 years of experience in one or more of the following:
  • Working in a Security Monitoring/Security Operations Center environment (SOC)
  • Experience investigating security events, threats and/or vulnerabilities
  • Demonstrate incident handling ability
  • Demonstrate ability to analysis log output from various devices
  • Understanding of electronic investigation and log correlation
  • Proficiency with the latest intrusion detection platforms; working knowledge of Windows systems administration (Including AD) and/or Linux.


Preferred Qualifications:

  • Information Security Principles, Technologies, and Practices
  • Proven experience with multiple security event detection platforms
  • Thorough understanding of TCP/IP
  • Demonstrated integrity in a professional environment
  • Good social, communication and technical writing skills
  • Comfortable navigating and troubleshooting Windows system issues
  • Desired Certifications - SSCP,CEH, GCIH, GCFA, GCIA, GSEC,GIAC,GSOC, Security+


What they offer:

  • Continuous learning: Develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: Provide the tools and flexibility, so you can make a significant impact, your way.
  • Transformative leadership: Give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: Be accepted for who you are and empowered to use your voice to help others find theirs.

Apply now

Subscribe our newsletter

New Things Will Always Update Regularly