Senior SOC Analyst L2

Porto, Portugal

Applications have closed

Natixis in Portugal

Global Financial Services is the global arm of Groupe BPCE. It comprises two businesses – Asset & Wealth Management and Corporate & Investment Banking – that support their clients in facing today’s major environmental, technological and...

View company page

Company Description

Founded in 2015, BPCE Infogérance & Technologies is a subsidiary of Groupe BPCE, dedicated to Infrastructures, End-User Environment, Security and Production. Driven by growth, expertise, transformation and agility, this project embraces an international mindset and a diverse skill set. You’ll find yourself in a dynamic and enriching workplace or, as we like to name it, a real tech playground, where you’ll be able to explore a huge tech stack. .

Job Description

We are looking for a SOC Analyst L2 (local contract) to join our BPCE IT business Unit.

Integrated within the Security Operation Center (SOC) BPCE-IT, the Blue Team is the first line of defence, responsible for defending the enterprise's use of information systems by maintaining its security posture against attackers. 

The main activities are the ones below: 

  • Detection, categorization and investigation of infrastructure, applications and security incidents 

  • Vulnerability management on critical vulnerabilities (handling, categorization and follow-up) 

  • Leading incident response plans 

  • Follow-up of remediation plans 

  • Implementation of detection scenarios and treatment of associated alerts 

The L2 SOC Analyst is responsible for monitoring and analyzing the organization’s networks and systems on a daily basis to detect, identify, investigate, and mitigate potential threats. They must be able to identify anomalous behavior, recognize patterns of malicious activity, and take appropriate corrective action. 

In addition to their daily duties, the L2 SOC Analyst will provide recommendations for improving security posture and assist with incident response plans, policies, and procedures. Some additional responsibilities may include recommending tools or solutions, participating in audit activities, providing reporting on security events/incidents and collaborating with other teams across the organization. 

Main Tasks and Responsabilities:

The candidate will have 3 main missions: 

1) Analysis: 

  • Participation in improving correlation and log analysis rules  

  • Conduct investigations and research including statistics  

  • Interpret or perform first level (Sandbox or manual) minimum scans on malicious codes 

  • Improve our Threat Intelligence activity   

2) Handling incidents: 

  • Creating, and managing service requests via our ticketing tools (ServiceSnow / SecOps / TheHive) 

  • Qualify and analyze these elements to determine the cause of the incident, the mode of operation of the attack (vulnerabilities use, tactics, technics), the scope and the perimeter of compromise 

3) Training: 

  • Knowledge transferring in-house and writing documentation  

Apart from these activities the candidate will have to maintain and develop his expertise: 

  • in techniques and tools of digital investigation 

  • methods and tools for analysis (monitoring, training, international conferences, etc.)

Qualifications

Main requirements:

The candidate must be operational on the security tools used in the BPCE IS and master the architectures in place. 

Solid knowledge in most of the following technical areas is required, keeping in mind that no one is an expert in every topic. 

The ideal candidate should have advanced problem-solving skills and a background in cybersecurity engineering. 

 
1) SIEM/SOAR 

  • Knowledge of the operating principles of Information Monitoring and Security Event Solutions (SIEM).  

  • Good experience of Splunk and Regex search syntax. 

  • Good experience of theHive 

3) SYSTEM/NETWORK 

  • Good knowledge of network and system architectures 

  • Knowledge of the operation of intrusion detection probes and event log correlation tools 

4) SECURITY: 

  • Good knowledge of Mitre Attack framework and counter measures link to the technics and tactics 

  • Good knowledge of Information monitoring and analysis tools and methods. 

  • Good knowledge of the security standards for different technologies (web servers, messaging, database, DNS, proxy, firewall, etc.) 

  • Have a good knowledge on one or more of the following topics: 

  • Web application vulnerabilities  

  • Malware types (rootkit, ransomware, botnet, etc.) 

  • Obfuscation and persistence technics (cryptography, packing, etc.). 

  • Digital investigation/analysis tools 

  • SandBox behavioral 

 

Other requirements:

  • Good level of English – minimum B2 level;
  • Good level of French - minimum B1 level;
  • Ability to keep up with a demanding and fast-paced environment;
  • Good communication skills;
  • Good priority definition skills;
  • Know how on implementing pedagogy methods;
  • Ability to work in a team.

Additional Information

At Natixis, we are committed to fostering a working environment where each and every one of our people is treated with dignity and respect and where every voice is heard. Our differences make us collectively stronger and are a source of fulfilment, innovation and performance.

In the framework of its Diversity, Equity & Inclusion policy, Natixis in Portugal has implemented a Blind CV Screening process, with the purpose of reducing hiring bias. A blind CV excludes any personal details which refer to the applicant’s gender, age or ethnicity. When applying for our positions, please submit a blind CV, that is, with no picture, name, gender, age, nationality, ethnicity and address. Your personal statement, work experience, courses and certifications, education, skills and contact information is what matters to us.

 

#MuchMoreThanJustAJob

Early morning. Campo 24 de Agosto. In 4 minutes, you are clocking in at the office. After grabbing a cup of coffee and fresh fruit, pick up your laptop and choose your spot for the day. It's going to be a busy one: French class before lunch and, just after, quick medical appointment at Natixis doctor's office.

Lunch break. Outside in the big terrace (look at your crops at the Urban Garden; ready to harvest!) or, if you feel like stretching your legs, walk downtown to grab lunch.

Back inside. Quick sprint review (working together anywhere means virtual happy birthday to that colleague in Paris that just turned 35). The afternoon went flying (tasks, reports, calls, some jokes with your teammates). End it on a high note: just one PlayStation game or the final match for that ping-pong tournament.

Tomorrow, you complete that certified technical training and the day after, you will work from home, taking advantage to finally do that online course on Udemy. Once you are done with your tasks for the day, you can visit the office for a board games session or show up at the rehearsal of one of Natixis bands. If that is too steady for you, meet your colleagues to surf some waves or join them in a football match.

 

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Blue team Cryptography DNS Firewalls Incident response Intrusion detection Log analysis Malware Monitoring SecOps SIEM SOAR SOC Splunk Threat intelligence Vulnerabilities Vulnerability management

Perks/benefits: Career development Conferences Gear Home office stipend Lunch / meals Startup environment Team events

Region: Europe
Country: Portugal
Job stats:  20  2  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.