PLURALIT Inclusive Technology: Let's grow together!
At PLURALIT, we connect Latin American talent with challenging projects across Europe, the UK and the US 🌍.
Our reputation is built on delivering the best talent in the industry. We offer a unique working environment that provides opportunities for growth, professional development and the potential to relocate abroad.
We believe in the power of partnership and work closely with our clients to deliver long-term value and support the careers of our team.
We are an inclusive and motivated bunch of people, driven by complex challenges.
Join us and be part of the #pluralitexperience! 🙌🏽
THE POSITION
As an L1 Security Analyst, you will be the first line of defence in monitoring and protecting our organization's IT infrastructure. Your primary responsibilities will include monitoring security systems, performing basic analysis of security logs, and analyzing alerts generated by various security tools. You will handle the initial response to security incidents by following established procedures and escalate complex or critical incidents to the L2 team.
Additionally, you will document all incidents and response activities thoroughly. With a foundational knowledge of networks and network protocols (TCP/IP, DNS, HTTP), familiarity with major security tools and technologies (SIEM, SOAR, EDR), and the ability to analyze system, network, and application logs, your role is vital in identifying and responding to potential security threats. Your ability to execute incident response procedures accurately and your basic skills in writing security reports will help ensure our security operations run smoothly and effectively.
RESPONSIBILITIES:
Monitoring security systems.
Basic analysis of security logs.
Analysing alerts generated by security systems.
Initial response to security incidents, following established procedures.
Escalation of complex or critical incidents to L2.
Documenting incidents and response activities.
TECHNICAL REQUIREMENTS:
At least 2-3 years of experience working in a Blue Team as an Incident Responder, Cybersecurity Security Analyst, or Security Operation Center Analyst working with EDR and SIEM technologies.
Experience with Rapid 7 and Crowdstrike is a must.
Basic knowledge of networks and network protocols (TCP/IP, DNS, HTTP).
Familiarity with major security tools and technologies (SIEM, SOAR, EDR).
Ability to analyze system, network, and application logs to identify anomalous behaviour.
Ability to execute incident response procedures following predefined guidelines.
Basic skills in writing security reports.
Experience with Google Security Operations, desired and Google Cybersecurity Professional Certificate is desired.
Experience with SC-200 Microsoft is desired.
Experience with CSA, CompTIA Security+, Splunk, Qradar is optional.
Oral English skills are required, and Italian skills are desired.
ABOUT YOU:
Strategic, pragmatic, analytical, and technical thinking.
Highly organized, ability to prioritize tasks and detail-oriented.
Exceptional judgment, tact, and decision-making ability.
Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change.
Innovative mindset and proactivity.
WHAT DO WE OFFER YOU?
We offer you a unique opportunity to elevate your career with a world-class international experience at the forefront of digital transformations.
You will boost your credentials in a high-growth international work environment that fosters entrepreneurship and innovation.
CONDITIONS
100% remote.
National Holidays
Vacations
Work-life balance