採用
JOB DESCRIPTIONJob Title:
Cybersecurity Tier 2 (SOC)
Location:
Kraków, Poland
Responsibilities and Duties:
Cybersecurity SOC Tier 2 analyst must be able to do the following:
- Correlate threat data from various sources to establish the threat/impact against the network.
- After assessment of the data, recommend appropriate countermeasures, facilitating tracking, preliminary handling of investigations, and reporting of all security events and computer incidents.
- Remediation actions and apply lessons learned to security incident investigation and resolution
- Perform monitoring, identification and resolution of security events to detect threats through analysis, investigations and prioritization of events based on risk/exposure
- Develop processes which analyzes data, producing accurate, meaningful, easily interpreted results based on user requirements and use cases
- Develop processes which align with enterprise incident response activities and coordinate closely with other teams within the Security Operations Center
- Create custom tool content to enhance capabilities of security operations teams
- Manage the collection, documentation and research of security events generated by the SOC monitoring platform and infrastructure
- Provide support to Security Incident Management aligned with NIST standards
Technical writing experience:
- Standard Operating Procedures
- Runbooks/Playbooks
- Incident Response Plans
- Support training develop with both analysts and tabletop exercises
- Assist or lead the effort in Tool configuration and content creation
Qualifications:
- 2-4 years of experience on one of the following team(s): Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC)
- Degree in Computer Science, Information Technology, or equivalent work experience
- Experience supporting Cyber Security Operations in a large enterprise environment
- Experience with Incident Response, analysis of network traffic, log analysis, ability to prioritize and differentiate between potential intrusion attempts and false alarms, managing and tracking investigations to resolution
- Experience with SIEM & Log Management solution
- Familiarity with one of the following; NIST Incident Response Lifecycle, Cyber Kill Chain, Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) Metrics
- CCNA Security, GCIA, GCIH, CYSA+, Security+ or other related security certifications
- At minimum there must be one active security certification
Experience with one or more of the following tools:
- Qradar SIEM/Cortex XSOAR
- Sentinel One
- Proofpoint Email
- Azure Suite
- Zscaler
Working Hours:
- 09.00 am to 07.00 pm local time
Why Join Us:
- Be part of a global cybersecurity team protecting a dynamic enterprise environment.
- Opportunity to work with modern security technologies and drive tool innovation.
- Collaborative culture with professional development opportunities.
- Hybrid work model with our Kraków office as the primary location.
総閲覧数
0
応募クリック数
0
模擬応募者数
0
スクラップ
0
類似の求人
Syscoについて

Sysco
PublicSysco Corporation is the largest food distribution company in North America, supplying restaurants, healthcare facilities, hotels, and other foodservice operations. The company distributes food products, kitchen equipment, and related supplies to approximately 700,000 customer locations.
10,001+
従業員数
Houston
本社所在地
$38B
企業価値
レビュー
2.7
3件のレビュー
ワークライフバランス
2.0
報酬
3.0
企業文化
2.5
キャリア
3.5
経営陣
2.5
25%



