Information Security Analyst responsible for security operations, threat hunting, and incident response at Bellinati Perez. Involves collaboration with internal teams and use of advanced security tools.
Responsibilities
Monitor and operate tools such as SIEM, SOAR, UEBA, XDR, NGFW, EDR, DLP, CASB, and SSPM;
Perform threat hunting, event investigations, and initial forensic analyses;
Create and maintain incident response playbooks;
Analyze and remediate vulnerabilities end-to-end (detection → prioritization → remediation);
Identify security gaps and implement technical controls;
Respond to critical incidents (containment, eradication, and lessons learned).
Hardening and Control Administration:
Perform hardening of Windows/AD and Linux systems;
Configure rules, policies, and alerts on NGFW, WAF, email security, proxies, and DLP;
Continuously assess the effectiveness of controls and recommend improvements.
Automation and Operational Efficiency:
Develop automations in Python, PowerShell, or Bash to reduce operational effort;
Integrate tools via APIs to improve investigation and response workflows.
Collaboration with Internal Teams:
Support infrastructure, network, and development teams on security-related matters;
Mentor junior analysts and assist in evolving operational processes.
Requirements
Bachelor's degree in a technology field such as Information Security, Computer Science, Information Systems, or a related area;
Hands-on experience in offensive/defensive security or security operations;
Proficiency in:
Advanced SIEM;
XDR/EDR;
Investigation and threat hunting;
Vulnerability management (Nessus/Qualys/OpenVAS);
Windows/Linux hardening;
NGFW, WAF, proxies, and email security solutions.
Soft skills:
High-level critical thinking;
Resilience to operate in crisis situations;
Clear, concise technical communication;
Attention to detail;
Collaboration and teamwork.
What will increase your chances:
Postgraduate degree or MBA in Information Security, Risk, or related fields;
Security Operations Engineer protecting Notion’s systems and users by investigating and responding to security events. Collaborating with a global team to enhance security processes and protocols.
SecOps Engineer at Aristocrat maintaining security for innovative iGaming platforms and collaborating with cross - functional teams. Focused on AWS services security and compliance assessments.
Cybersecurity Incident Response Analyst handling security events and incidents at Var Group in a hybrid work environment. Focused on ensuring response to security incidents and improving security processes.
Cybersecurity Incident Response Analyst handling security incidents and threats. Working in a hybrid environment at Yarix, a leader in digital evolution.
IAM Security Ops Analyst overseeing access management for clinical trial applications at Syneos Health. Collaborating with IT and compliance teams to enforce IAM policies and improve operational performance.
Fraud Operations Group Manager responsible for managing fraud management policies in the Operations Services team. Leading teams in minimizing fraud impacts while ensuring compliance and operational objectives.
Senior SOC Analyst specializing in security operations and incident response at PEXA, advancing digital property solutions in the UK. Collaborating with teams to enhance security measures and respond to incidents.
Overseeing global security operations across 81 sites for QVC Group, a Fortune 500 live shopping company. Managing security programs with expertise in investigations and crisis management.
Junior SOC Analyst supporting security team with monitoring and analysis of security incidents in Berlin. In a hybrid work environment, gain hands - on cybersecurity experience through mentorship.