Senior Information Security Analyst (SOC L3)
Heredia, Costa Rica
Applications have closed
Eurofins
World leader in food, environment, pharma product testing & agroscience CRO services; 61,000 staff across a network of more than 1,000 independent companies (940 laboratories) in 59 countries, offering over 200,000 analytical methods.Company Description
Eurofins Scientific is an international life sciences company, which provides a unique range of analytical testing services to clients across multiple industries. The Group believes it is the world leader in food, environment, pharmaceutical and cosmetics products testing and in agroscience CRO services. It is also one of the global independent market leaders in certain testing and laboratory services for genomics, discovery pharmacology, forensics, CDMO, advanced material sciences and for supporting clinical studies. In addition, Eurofins is one of the leading global emerging players in specialty clinical diagnostic testing.
In 2018, Eurofins generated 4.2 billion Euro proforma turnover in 800 laboratories across 47 countries, employing about 45.000 staff.
Eurofins Technologies is a new International Business Line (IBL) within the Eurofins Group focused on the development, manufacturing and marketing of bioanalytical technologies and diagnostic test kits in particular. The business if primarily focused on solutions in Food Safety and Environmental Safety but has recently expanded into Animal Health and Clinical Diagnostics. Eurofins Technologies serves both external customers (industrial laboratories, governmental laboratories, service laboratories) as well as customers within the Eurofins Group.
Job Description
Eurofins is ramping up the Security Operations Center and has a need to extend the L3 incident resolvers’ team. The person working in L3 SOC team receives incidents escalated from L2 SOC, gets to manage most complex findings and work towards remediation of the incidents found.
He/she continuously operates the Security Incident process, driving the resolution of identified issues, as part of the team, bringing the necessary experience and expertise above the existing L2 SOC level.
Day to day basis
- Triage and deep investigation of cyber security events with use of SIEM, IDS, EDR, antivirus, Internet Footprint tools, proxy solutions
- Security Event Correlation as received from L2 SOC or Incident Response staff or relevant sources to determine increased risk to the business
- Recognize potential, successful, and unsuccessful intrusion attempts/compromises thorough review and analysis of relevant event detail and summary information
- Development and execution of SOC procedures
- Investigate and lead security incidents (IR lifecycle).
- Ensure confidentiality and protection of sensitive data
- Analysis of phishing emails reported by internal end users
- Working with remediation (IT Infra & Ops) teams on events and incident mitigation
- Host based forensics. (Knowledge of data acquisition and analysis using forensic tools)
- Network based forensics. (Ability to read and understand PCAP files)
Qualifications
Required
- Minimum of 3-5 years of professional experience as a SOC Analyst (L2 or L3), threat researcher or hunter or a similar comparable role dealing with incident handling, alert tracking or cybersecurity case management.
- Willingness to work overtime and adjust to reasonable demands from management in case of critical incidents being escalated to L3 for immediate handling
- Must have understanding of cybersecurity incident discovery and event management, network forensics, IPS/IDS, firewalls, content filtering technology, DLP, configuration management and monitoring, endpoint protection, database security, and log collection and analysis.
- Strong working knowledge of different attack vectors and attack types.
- Experience and keen understanding of cybersecurity tools, including SIEM, IDS/IPS, antivirus and endpoint detection & response solutions.
- Experience with leading security incident response
- Able to multitask and give equal and/or required attention to a variety of functions
- Ability to work independently and take ownership of projects and initiatives
- Excellent written and verbal communication skills required. Must be able to communicate technical details clearly
- Experience in developing and maintaining Play/Run-Books and/or Standard Operating Procedures in a SOC environment (Nice to have – Experience is a plus)
- Strong troubleshooting, reasoning, and analytical problem-solving skills
- Ability to communicate technical details effectively in writing and verbally to junior IT personnel and management
- Team player with the ability to work autonomously
Preferred qualifications
- Involvement in threat intelligence and cybersecurity communities
- Experience in cybersecurity incident discovery and event management, network forensics, IPS/IDS, firewalls, content filtering technology, DLP, configuration management and monitoring, endpoint protection, database security, and log collection and analysis.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: EDR Firewalls Forensics IDS Incident response Industrial IPS Monitoring PCAP SIEM SOC Threat intelligence
Perks/benefits: Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Security Operations Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Senior Security Architect jobs
- Open Security Operations Analyst jobs
- Open Clearance-related jobs
- Open Windows-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open IDS-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs
- Open IPS-related jobs
- Open CEH-related jobs