Назад
Company hidden
1 день назад

Cyber Defense Analyst

Формат работы
onsite
Тип работы
fulltime
Грейд
junior
Английский
c1
Страна
ES
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Cyber Defense Analyst (Cybersecurity): Monitor, support, and configure SIEM and endpoint security tools to identify and respond to threats across infrastructure, endpoints, and cloud environments with an accent on event correlation, alert triage, and security infrastructure maintenance. Focus on analyzing incidents, fine-tuning detection rules, validating compliance, and collaborating with IT teams to enforce secure configurations and policies.

Location: San Salvador, El Salvador (onsite, full-time)

Company

AI-native organization designing, building, and scaling AI-powered solutions that create business impact across design, development, cloud, data, and AI.

What you will do

  • Monitor and configure SIEM, endpoint security, and cloud tools to detect threats and correlate events across endpoints, networks, identity, and cloud.
  • Triage, analyze, and escalate security alerts following SOC procedures, assisting in containment and response during incidents.
  • Fine-tune detection rules, review logs and network activity for suspicious behaviors, and document incidents and investigations.
  • Provide support for security infrastructure (Fortinet, Palo Alto), IAM (MS Entra ID), and endpoint protection solutions.
  • Ensure cloud visibility, log collection, and compliance with security baselines in GCP and Azure environments.
  • Collaborate with IT teams on network architecture, identity protection, MFA enforcement, and process improvements including playbooks and post-incident analysis.

Requirements

  • Advanced English required.
  • Bachelor’s degree in IT, Computer Science, Cybersecurity, or equivalent experience.
  • At least 1 year hands-on experience in Cybersecurity or SOC role.
  • Experience with SIEM (MS Sentinel, Stellar Cyber, Google SecOps), EDR/XDR (SentinelOne, MS Defender, Cortex XDR).
  • Knowledge of security infrastructure (Fortinet, Palo Alto), IAM (MS Entra ID), cloud (GCP, Azure), IR, MITRE ATT&CK.
  • Basic scripting (PowerShell, Python, KQL); Manage Engine and Microsoft Security products.
  • Strong analytical skills, communication, and ability to work independently under pressure.

Nice to have

  • Certifications: CompTIA Security+, Certified SOC Analyst (CSA), EC-Council Certified Incident Handler (ECIH).

Culture & Benefits

  • High-performance culture based on Empowering Excellence, Collaborative Teamwork, Unsolicited Respect, Consistent Transparency, and Efficient Communication.
  • Work alongside strong teams in a fast-paced environment focused on learning, ownership, and modern ways of working.
  • Participate in AI-native transformation at scale with investment in evolving organization.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →