Hybrid Information Security Analyst – Mid, SecOps

Posted last month

Apply now

About the role

  • Information Security Analyst managing security operations and incident response for a credit recovery firm. Involves collaboration with infrastructure, networks, and development teams.

Responsibilities

  • Monitor and operate tools such as SIEM, SOAR, UEBA, XDR, NGFW, EDR, DLP, CASB, SSPM;
  • Perform threat hunting, event investigations, and initial forensic analyses;
  • Create and maintain incident response playbooks;
  • Analyze and remediate vulnerabilities end-to-end (detection → prioritization → remediation);
  • Identify security gaps and implement technical controls;
  • Respond to critical incidents (containment, eradication, and lessons learned);
  • Perform hardening of Windows/Active Directory and Linux systems;
  • Configure rules, policies, and alerts on NGFW, WAF, email security, proxies, and DLP;
  • Continuously evaluate the effectiveness of controls and recommend improvements;
  • Develop automations in Python, PowerShell, or Bash to reduce operational effort;
  • Integrate tools via APIs to improve investigation and response workflows;
  • Support infrastructure, networking, and development teams on security matters;
  • Mentor junior analysts and assist in improving operational processes.

Requirements

  • Bachelor's degree in a technology field, such as Information Security, Computer Science, Information Systems, or related areas;
  • 4–6 years of experience in offensive/defensive security or security operations;
  • Strong knowledge of:
  • • Advanced SIEM;
  • • XDR/EDR;
  • • Investigation and threat hunting;
  • • Vulnerability management (Nessus/Qualys/OpenVAS);
  • • Windows/Linux hardening;
  • • NGFW, WAF, proxies, and email security solutions.
  • Soft skills:
  • • High-level critical thinking;
  • • Resilience to operate in crisis situations;
  • • Clear and concise technical communication;
  • • Attention to detail;
  • • Collaboration and teamwork.
  • What will increase your chances:
  • • Postgraduate degree or MBA in Information Security, Risk, or related areas;
  • • Certifications: GCIH, GCIA, GMON, SC-200, SC-300, CCSP, AWS Security Specialty;
  • • Experience with customized SOAR;
  • • Intermediate knowledge of digital forensics;
  • • Experience with containers/Kubernetes;
  • • Intermediate experience in SAST/DAST and DevSecOps practices.

Benefits

  • Meal allowance (R$31.00/day)
  • Transportation voucher
  • Career development plan
  • Multi-benefit card
  • Life insurance
  • Partnership with SESC
  • University partnerships
  • Corporate university
  • Birthday day off
  • "Just dress no code" – be yourself!
  • Dental plan
  • Gympass/Wellhub
  • Psychological support
  • On-site medical doctor available at locations

Job title

Information Security Analyst – Mid, SecOps

Job type

Experience level

Mid levelSenior

Salary

Not specified

Degree requirement

Bachelor's Degree

Location requirements

Report this job

See something inaccurate? Let us know and we'll update the listing.

Report job