skok nahlavní menu

IT security operations specialist {nabídka práce}

CZ - Prague
Security & Audit

Popis pracovní pozice

You will be end to end responsible for operations, development and continuous improvement of Security systems with the worldwide Companies scope. You will define and organize the implementation of IT security policy in related security and network security systems. You will also cooperate and configure system security policies such as SIEM, Privilege access management or vulnerability management. The responsibility in this position will also be the development of company cyber defense - support of security monitoring team during investigation and handling of security events and incidents, help to adopt a more proactive approach to identifying previously unknown or ongoing no remediated threats within our organization's infrastructure.

 

Požadavky

At least 3 years’ experience in IT security Operation area (SIEM technology preferred)
- Fluent English both spoken and written
- The perfect time management and communication skills
- Experience with building or operating the SOC is a plus
- Interested in IT field, openly proves the appetite to learn new thinks, healthy approach to understand analytical thinking.
- Knowledge of IT Security principles, systems architecture and security best practice and frameworks such as ISO 27000, ITIL, COBIT.
- Capability to write simple scripts in bash/python or any other scripting language
- Understanding and practical experience with REST API and with writing regular expressions
- Knowledge of IT systems, technologies, cloud platforms (MS Azure), and networking (LAN, WAN and Internet network infrastructure, Unix based systems and Windows systems).
- In-depth knowledge of at least a few of the IT security technologies like IT Security and Network monitoring (SIEM, Netflow/SFlow/JFlow etc.), DLP, IdM, PAM, IPS/IDS, Vulnerability management, application firewalls etc.
- Good knowledge of logging pipelines with tools like rsyslog, vector, fluentd, or logstash. You must be familiar with how these tools are configured, scalable, and pluggable into other systems, such as cloud storage and SIEMs.
- Having a good understanding of recent attacker techniques, tactics, and procedures (TTPs) can help to develop a robust set of within our environment.

Mám zájem!

Připojte svůj životopis (CV).




Zpět na přehled pracovních nabídek