Your main responsibilities:

  • Implement a security monitoring system, by integrating the target infrastructure log sources (Operating Systems, Networking Equipment, Firewalling Equipment, Application Logs, etc.) and Threat intelligence sources
  • Participate in the installation phases of a monitoring system, by inserting the equipment into the network
  • Carry out the tuning activities on the platform during the commissioning of the system;
  • Participate in the training phases of the platform with the Client

What technical requirements are needed:

  • Experience in the role
  • Knowledge of security products, networking and operating systems.
  • Knowledge of Cyber Security and Networking architectures, processes, concepts and best practices applied to an Enterprise reality.
  • In-depth knowledge of Linux Operating Systems (Centos)
  • Knowledge of the functioning of the main security systems such as Firewall, AntiVirus, Intrusion Detection / Intrusion Prevention systems, VPN, remote accesses (Citrix, VDI etc.), segregation of networks.
  • Problem solving skills in the areas described above, with the possibility of contacting the supplier / applicant directly for the solution of the problem (eg opening and managing internal tickets or equipment malfunctions)
  • Knowledge of the ISO 27001 standard on information security management systems 

What are we looking for in you:

  • Collaboration and team work
  • Autonomy in carrying out the tasks assigned in a proactive manner
  • Curiosity and ability to learn in depth
  • Concreteness and result orientation, reaching results in a defined time
Curriculum Vitae (PDF | DOC) *
Get in touch

Request more information

Contact Us