Security Analyst - L1 / L2 / L3
Jakarta
Horangi Cyber Security
Leading cyber security firm in Asia, offering advanced cyber security products and services, including consulting. We specialize in equipping businesses with robust security solutions and expert guidance to navigate the digital landscape...Our mission at Bitdefender is to reduce risk to customers’ business to allow them to achieve their objectives. We are focused on delivering real security value for an affordable price – no snake oil. To help in this mission, we are looking for a Security Analyst. You will work in a tight knit, experienced team backed up by an international organization that’s been in business for 18 years.
About Us :The Managed Detection & Response service is a new line of business (think division, business unit, etc). We are an experienced team having built successful Managed Security offerings in the past and staffed by a multitude of cybersecurity organizations and veteran cyber-warfare operators from the military and intelligence services. We all got into this business to provide security services that make customers safer. We must make some money to do that, but our primary goal is to provide services that secure, not just ones that sell.
Our team has been around the block together and operate in a 24x7 environment where we manage emergency situations for customers. For this to work, we must trust each other. As a leadership team, we focus on building that trust through accountability, processes and personal relationships. We have plenty of experienced team members with and without families and understand that not all teams can be built outside of work, but we focus on teamwork to build authentic and meaningful engagement.
About The Role :
- This is a full-time position in a 24/7 operation with a 12-hour shift Panama schedule. Scheduled rotations for night and weekend shifts will be required.
- Under limited supervision, the Security Analyst performs real-time monitoring and analysis of security events from multiple sources.
- Triage security events to determine priority and severity
- Use indicators of compromise from current intelligence information to proactively review customers environments searching for suspicious behavior across network, host and logs data.
- Assist in the development of analytic signatures to identify suspicious and malicious behaviors
About You :
- Be able to demonstrate understanding of cybersecurity principles,
- Cybersecurity principles
- Cyber threats and vulnerabilities
- Current incident response methodologies
- Current cyber investigative techniques
- Current cyber threat trends
- Computer networking concepts and protocols, and network security methodologies
- Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, NICs, HDDs)
- Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security
- Basic system administration, network, and operating system hardening techniques
- Identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files)
- Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
- Defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness)
- Virtualization and cloud computing
- Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files
- Hacking methodologies
- Networking protocols (e.g., TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications
- Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA]) and how they are used
- How to perform packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
- Security Information and Event Management (SIEM) tools - Searching, aggregating, and correlating data
- Web Application Firewall (WAF)
- Regular Expressions (Regex)
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: AES Analytics Artificial Intelligence Cloud DNS Encryption Firewalls IDS Incident response Intrusion detection IoT Linux Log files Monitoring Network security Privacy SIEM TCP/IP UNIX Vulnerabilities Windows
Perks/benefits: Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Product Security Engineer jobs
- Open Senior Cybersecurity Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cloud Security Architect jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Senior Network Security Engineer jobs
- Open Senior Product Security Engineer jobs
- Open Security Specialist jobs
- Open Cyber Security Architect jobs
- Open Security Operations Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Information System Security Officer jobs
- Open Security Consultant jobs
- Open Information Systems Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Information Security Architect jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Security Architect jobs
- Open CISA-related jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open Analytics-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open GCP-related jobs
- Open ISO 27001-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open DoD-related jobs
- Open DevOps-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Vulnerability management-related jobs
- Open Security Clearance-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs
- Open SaaS-related jobs
- Open Malware-related jobs
- Open Security assessment-related jobs
- Open PowerShell-related jobs
- Open SQL-related jobs