
Cyber Security Analyst / Incident Responder
- Milano
- Tempo indeterminato
- Full time
- Support SIEM Use Cases definition and alerts engineering
- Support the Vulnerability management and prevention unit
- Review the effectiveness of the EDR’s detections
- Support the other teams within the GOSP CSO Division
- Analyze the security incident identified by SOC and other activators, assess and assign the appropriate severity and priority, contain the threat, define and monitor the remediation activities
- Proactively identify possible threats performing threat hunting activities
- Define the priority of incidents to determine the appropriate response and course of action that has to be taken to effectively manage the incident lifecycle
- Identify events that could lead to loss or disruption of operation, service or function within the organization, leveraging OSINT sources and early warning received by the Group Security Intelligence Team
- Limit disruption and its consequences and returning back to business as usual
- Support, monitor and control the mitigation / resolution activities undertaken
- Execute the escalation process when incident becomes a crisis / emergency
- Provide structured ex post analysis to the detection or resolution of the event
- Perform forensic analysis on infected assets
- Report and present the results of the analysis in both oral and written form to different stakeholders
- Manage and evolve the tools supporting the Incident management process
- Monitor all the security events, detecting, containing, managing and mitigating through the SOC
- Perform Intelligence activities in order to develop and manage the Security Intelligence tools, feeds and platforms of the CSIRT
- Evaluate and scout new tools to increase the CSIRT response capability
- Support GHO IT Security to define a set of possible attacks (use cases), assessing the probability, the potential harm and the priority of identified attacks and thus minimizing the risk involved
- Manage, test and evolve the Security Operation Center
- Support the other teams within the GOSP CSO division
- STEM degree-level (Science, Technology, Engineering or Mathematics) with strong passion on cyber security
- Knowledge of SIEM technologies (QRadar, Splunk, … ) and Big Data tools for analytics
- Strong understanding of attackers tactics techniques and procedures;
- Strong understanding of the security implications and investigation methods for the most common IT components: network infrastructure (routing, switching and firewalls), security infrastructure (IPS, WAF, AV), OS knowledge (Linux/UNIX and Microsoft Windows, client and server), core infrastructures (Active Directory, Exchange, DNS, DHCP), full stack web services infrastructure and technologies involved (front-end to back-end). Analysis of network captures and knowledge of TCP/IP and network protocols
- Forensic analysis experience
- Threat hunting activities experience
- Experience in at least one of the following programming languages: Python, C, C++, Java
- Certifications on Information Security (e.g. GIAC GCFE, GSEC, CEH, CSX, CHFI etc.) would be a plus
- Strong passion on cyber security
- Ability to work in large international organization, in multicultural contexts and to deal with different scenarios
- Analytical and communication skills
- Demonstrated ability to work effectively as part of a team sharing and parallelizing tasks and knowledges
- Excellent written and oral English language skills
- Advanced problem solving and analytical
- Great attention to privacy and confidentiality managing critical information. Great sense of information classification and ability to understand the right level of disclosure in each situation
- Pugnacity, tenacity, imagination, judgment and the resistance to stress are also key qualities in that job