Security Operations Center Analyst Opportunity

ITJ company

Subscribe to our Telegram Channel

Security Operations Center Analyst in MEXICO

Remote 12 hours ago

We are ITJ, a binational US-Mexican company focused on building Software Centers of Excellence in Latin America, especially in Mexico.


We partner with fast-growing, high-impact industries, particularly in the BioMedTech space. That means we work directly with innovative medical device companies in the U.S. companies that are literally developing technology to improve and save lives.


We don’t just build software, we help our partners build scalable, long-term engineering teams, so our employees work on real products, not outsourcing gigs. It’s a collaborative and meaningful environment.


WE'RE LOOKING FOR A SECURITY OPERATIONS CENTER ANALYST


We are seeking a SOC Analyst. This role will be responsible for day-to-day security operations, identifying threats and vulnerabilities, and containing them, as well as recommending corrective actions for eradication.


This role will test and ensure compliance of internal and commercial offerings with security policies and standards, as well as with applicable regulations and laws.


You will also perform assessments of systems and networks within the network environment or enclave and identify where those systems/networks deviate from acceptable configurations, enclave policy, or local policy.


The output will measure the effectiveness of defense-in-depth architecture against known vulnerabilities. As a member of the Cyber Security Incident Response Team (CSIRT), you will be the front-line responder, combating cybersecurity threats against our Information Technology Environments/Services. You will conduct incident response activities, including advanced investigation, response, and remediation. Each member of the team will play a role in Incident Response.


Essential Duties:

Include, but are not limited to, the following:

  • Conduct monitoring and detection analysis using cybersecurity defense tools.
  • Correlate activity across assets (endpoint, network, apps) and environments (on-premises, cloud) to identify patterns of anomalous activity.
  • Build and manage relationships with 3rd party SOC providers.
  • Review and assess alerts to contain any intrusions or threats.
  • Provide reports on events that occur within the environment.
  • Test systems to understand compliance with cybersecurity policies and drive remediation, as required.
  • Stay abreast of emerging threats and vulnerabilities to assist in the identification of incidents.
  • Preserve all records indicating changes made to access control lists to facilitate audits and other investigations.
  • Maintain detailed program metrics around initiative goals.
  • Participate in an on-call rotation.
  • Uphold company mission and values through accountability, innovation, integrity, quality, and teamwork.
  • Support and comply with the company’s Quality Management System policies and procedures.
  • Maintain regular and reliable attendance.
  • Ability to act with an inclusion mindset and model these behaviors for the organization.


Minimum Qualifications:

  • Bachelor’s degree in computer science, engineering, or related field as outlined in the essential duties.
  • 3 to 5 years of relevant work experience in incident response, digital forensics, and infrastructure security in a regulated environment.
  • Strong customer focus with a track record for driving delivery and operational performance improvements across an organization.
  • Demonstrated track record of rapidly responding to alerts, threat hunting, digital forensics, threat mitigation, and remediation.
  • Excellent change management and issue resolution skills with the ability to deliver results.
  • Excellent verbal and written communication skills, as well as customer service and organizational skills.
  • Demonstrated ability to perform the essential duties of the position with or without accommodation.


Nice to have:

  • Obtained or working towards industry certification/s relating to incident response/digital forensics (GCFE, GCIH, CEH, etc.).
  • Experience in healthcare or biotech industries.
  • Experience with any of the following: AWS, Cloud Trail, Guard Duty, AzureAD, Azure Data Lake.


We offer

Benefits above the Law (food coupons, saving funds, educational reimbursement, and more)

100% remote squeme


Apply now

Subscribe our newsletter

New Things Will Always Update Regularly