What Youll DoWhen you are on-shift, your activity is to focus on responding. You are the point of contact for all matters related to alerts. This includes escalation, documentation, reporting and adhoc response.
- Alongside L1/L2 Analysts, you participate in the daily alert triage, helping with prioritisation depending on the threat level and potential impact.
- After the daily alert triage, you take ownership of alerts and drive them to resolution through investigation and stakeholders engagement.
- You involve IT stakeholders in the risk assessment, and you coordinate implementation of remediation or mitigation actions.
- You provide feedback to L1/L2 Analysts to improve analysis quality and consistency.
When you are off-shift, your activity is to focus on building. You participate in scope extension and automation.- You identify opportunities to improve detection, triage, and response processes.
- You translate ad-hoc L3 procedures into repeatable L1/L2 workflows.
- You collaborate with the Cortex XSOAR developer to implement automation related to the CVM Program.
- You work with IT and Cyber teams to enhance asset visibility and attack surface detection.
Profile we expect
Experience and competencies- Significant Cybersecurity Experience in vulnerability management, incident response, and/or SOC environments.
AND/OR
- IT Experience in infrastructure and/or operations.
- Analytical Skills to assess technical risk and uncover critical exploitation paths.
- Clear Communication to coordinate effectively across IT and Cyber teams.
- Familiarity with Tools like:
- Orchestration/ticketing systems (e.g., XSOAR, ServiceNow)
- Vulnerability scanners (e.g., Tenable, Qualys)
- Data Analysis tools (e.g., SQL, Power BI, Excel)
You dont need to know our exact stack, but experience with similar tools will help you ramp up quickly.
- Process Mindset to improve and document repeatable workflows.
- Curiosity & Initiative to explore how systems and teams interact.
English is the primary working language. Additional languages are a plus but not required.
Mindset and soft-skillsAs a member of our transversal Cyber team, collaborating closely with various Operational teams across the Company, youll need the followingskills and qualities:- Adaptability: youll handle multiple investigations at the same time while continuing supporting other teams, switching from one topic to another while talking to different audiences.
- Prioritization: as your position deals with potential high-risk, youll need to decide quickly what to handle first, depending on your assessment of exploitability and business impact.
- Curiosity: reacting is good, but understanding contextual environment of an asset, how it is protected, and the potential exploitation paths, is crucial in the job.
- Persistence: in such a large Company, not everything is perfect nor up-to-date, so youll often need to dig deep to find the right stakeholders.