FOR RECRUITERS
LOG IN
SIGN UP
Tech Job Finder - Find Tech, Software, Sales and Prouct Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

Security Monitoring Analyst

at Santander CIB

Back to all Cybersecurity jobs
Santander CIB logo
Investment Banking

Security Monitoring Analyst

at Santander CIB

ExperiencedNo visa sponsorshipcybersecurity

Posted 11 hours ago

null clicks

Compensation
Not specified

Currency: Not specified

City
CDMX
Country
Mexico

The Security Monitoring Analyst will join the Cyber Fusion Center to monitor security events across multiple systems, distinguishing benign from malicious activity. The role involves event triage, designing correlation searches, and improving alert accuracy to enhance security monitoring processes.

Security Monitoring Analyst

Country: Mexico

The Security Monitoring Analyst would join the Cyber Fusion Center (CFC) and work to monitor for indicators of attack and improve our processes and procedure. A successful candidate for this role will have experience reviewing security events from multiple systems (Windows, Unix, routers, switches and endpoints) and be able to understand what events are benign and what may be malicious based on data classification, behavior and context. While this role focuses heavily on review and triage of events, a successful candidate will also know how to design and implement correlation searches to respond to changes in the environment and reduce false positives.

Experience:

  • 5-7 years of cyber security monitoring experience
  • Skilled with Splunk searches and queries
  • Strong adversarial mindset (think like an attacker)
  • Coaching and mentorship skills
  • Monitor and detect security events from SIEM, Log collection Engines and other security technologies, such as Splunk and McAfee DLP
  • Perform investigations using security platforms to determine false positives or escalate (i.e. IDS/IPS, DLP, etc.)
  • Monitoring of health alerts and downstream dependencies
  • Review and take a proactive approach to false positive and work with other teams to improve accuracy of the alerts
  • Document, investigate and notify appropriate contact for security events and response Collaborate with technical teams for security incident remediation and communication
  • Conduct security research on threats and remediation methods
  • Prepares system security reports by collecting, analyzing, and summarizing data and trends; presents reporting for management revie
  • Fluent in English and Spanish

Security Monitoring Analyst

at Santander CIB

Back to all Cybersecurity jobs
Santander CIB logo
Investment Banking

Security Monitoring Analyst

at Santander CIB

ExperiencedNo visa sponsorshipcybersecurity

Posted 11 hours ago

null clicks

Compensation
Not specified

Currency: Not specified

City
CDMX
Country
Mexico

The Security Monitoring Analyst will join the Cyber Fusion Center to monitor security events across multiple systems, distinguishing benign from malicious activity. The role involves event triage, designing correlation searches, and improving alert accuracy to enhance security monitoring processes.

Security Monitoring Analyst

Country: Mexico

The Security Monitoring Analyst would join the Cyber Fusion Center (CFC) and work to monitor for indicators of attack and improve our processes and procedure. A successful candidate for this role will have experience reviewing security events from multiple systems (Windows, Unix, routers, switches and endpoints) and be able to understand what events are benign and what may be malicious based on data classification, behavior and context. While this role focuses heavily on review and triage of events, a successful candidate will also know how to design and implement correlation searches to respond to changes in the environment and reduce false positives.

Experience:

  • 5-7 years of cyber security monitoring experience
  • Skilled with Splunk searches and queries
  • Strong adversarial mindset (think like an attacker)
  • Coaching and mentorship skills
  • Monitor and detect security events from SIEM, Log collection Engines and other security technologies, such as Splunk and McAfee DLP
  • Perform investigations using security platforms to determine false positives or escalate (i.e. IDS/IPS, DLP, etc.)
  • Monitoring of health alerts and downstream dependencies
  • Review and take a proactive approach to false positive and work with other teams to improve accuracy of the alerts
  • Document, investigate and notify appropriate contact for security events and response Collaborate with technical teams for security incident remediation and communication
  • Conduct security research on threats and remediation methods
  • Prepares system security reports by collecting, analyzing, and summarizing data and trends; presents reporting for management revie
  • Fluent in English and Spanish