35 Empregos para Analyst Security Operation Center Iii (Soc) - Brasil
Analista estratégia segurança do produto pleno (security monitoring)
Ontem
Trabalho visualizado
Descrição Do Trabalho
- Conhecimento em ferramentas de monitoramento de segurança, como Splunk;
- Experiência com análise de dados e indicadores (Big Data);
- Domínio de SQL para consultas, análises e troubleshooting de dados;
- Conhecimentos em Python para automações, scripts e tratamento de dados;
- Capacidade analítica e foco em resolução de problemas;
- Boa comunicação para suporte técnico e interação com áreas parceiras;
- Desejável experiência com ambientes de segurança da informação;
- Experiencia em Pythone Databricks;
- Pacote Office.
- Monitorar e analisar indicadores relacionados à segurança e integridade dos dados;
- Realizar diagnósticos granulares e análises aprofundadas;
- Acompanhar e interpretar dados do DNA;
- Gerar e manter relatórios analíticos;
- Atuar com suporte à autorização e garantir segurança nas integrações;
- Prestar suporte técnico e operacional às áreas envolvidas no tema.
- Monitorar e reagir a alertas via Splunk;
- Utilizar SQL e Python para extração, transformação e automação de dados e alertas;
- Buscar oportunidades e melhorias no portfolio.
Security & Performance Monitoring Analyst
Publicado há 10 dias atrás
Trabalho visualizado
Descrição Do Trabalho
Join to apply for the Security & Performance Monitoring Analyst role at Lumenalta
Security & Performance Monitoring AnalystJoin to apply for the Security & Performance Monitoring Analyst role at Lumenalta
At Lumenalta, we create impactful software solutions that drive innovation and transform businesses. Since 2000, we’ve partnered with visionary leaders to build cutting-edge tech, solve complex challenges, and deliver results faster through our elite teams and tech-driven approach. Join us in shaping the future of technology.
Experience Remote done Right. With over 20 years of remote experience, all 500+ staff are 100% remote, and we still grow vibrant relationships and provide exceptional opportunities for career growth while working with stellar clients on ambitious projects.
What You’ll Do
- Continuously monitor security alerts and system performance using:
- AWS GuardDuty, Security Hub, CloudWatch, CloudTrail Insights, X-Ray, AWS Config, Inspector, Shield
- Perform Level 1 triage: validate alerts, enrich context, and apply scripted/runbook fixes
- Lead Level 2 investigations: root cause analysis, log forensics, and trace diagnostics
- Maintain and tune detection rules, alarms, dashboards, and automated remediation workflows
- Follow structured playbooks and escalate high-severity or novel events to engineering or security leadership
- Document incidents, fixes, and escalations in JIRA Service Management
- Work collaboratively with DevOps teams on Terraform pipelines to ensure secure, monitored infrastructure
- Contribute to global 24×7 coverage via rotating shifts, adhering to Lumenalta’s SLAs and incident protocols
What You Bring
- 2–4 years in a SOC, security engineering, or site reliability role within an AWS environment
- Strong hands-on experience with:
- AWS monitoring & security tools: GuardDuty, Security Hub, CloudTrail, CloudWatch, X-Ray, Inspector, etc.
- Network and host-level security: WAF, VPC Flow Logs, EC2 hardening
- Familiarity with:
- Scripting (Python or Bash),
- Terraform workflows and CI/CD impacts on security monitoring,
- MITRE ATT&CK framework and SANS IR best practices
- Performance analysis for serverless and microservices environments
- Proficiency with JIRA and ITSM documentation
- AWS Security certification (preferred)
Who You Are
- Calm, focused, and methodical under pressure
- Communicates clearly and concisely in written incident reports and hand-offs
- Eager to follow structured runbooks and improve them over time
- Flexible and collaborative—able to work across time zones and with global teams
- Passionate about both security and reliability in modern cloud architectures
Lumenalta is committed to hiring exceptional talent from a wide variety of diverse backgrounds. If you share our values and enthusiasm for digital transformation, we encourage you to apply
What's it like to work at Lumenalta?
The application deadline is 5/31/25
Seniority level- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Engineering and Information Technology
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at Lumenalta by 2x
Get notified about new Performance Analyst jobs in Brazil .
Business Analyst Career Opportunities at Dev.Pro - 01We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrIncident Response Engineer
Ontem
Trabalho visualizado
Descrição Do Trabalho
As a member of the ETMSA team at Crypto.com , you will be integral to responding to and managing cybersecurity threats and incidents throughout their lifecycle – from Preparation to Identification, Containment, Eradication, Recovery, and Lessons Learned – collaborating with a global team of incident responders.
You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), Intrusion Detection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more.
You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments.
Responsibilities
- Report to Director to facilitate all phases in the incident response lifecycle
- Be involved in various incident prevention projects to improve Security posture
Preparation:
- Understand different regulatory and compliance requirements like critical time to report, escalation flows, etc.
- Take part in self-assessment exercises like Tabletop Exercises, Attack Simulations, Red/Purple Team exercises to make sure the incident response process is working smoothly
Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements
- Evaluate the incident response readiness of different layers - people, process, technology
Detection & Analysis:
- Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team.
- Respond to cyber security incidents in compliance with the local authority / regulatory requirements.
- Assess the risk, impact and scope of the identified security threats
- Perform deep-dive incident analysis of various data sources by analysing and investigating security related logs against medium-term threats and IOCs
Containment, Eradication and Recovery:
- Communicate with the stakeholders and provide guidance, recommendations to contain and eradicate the security incident
- Participate in root cause analysis using forensic and other custom tools to identify any sources of compromise and/or malicious activities taking place.
- Document and present investigative findings for high profile events and other incidents of interest.
Post incident activities:
- Provide lessons learnt meeting to the stakeholders
- Lead and keep track on the follow-up activities
- Document the incident in the case management system and provide incident reports
Always ready to jump in, in the event of security incidents.
- At least 5 years experience in the Cyber Security industry
- Strong technical and analytical skills
- Familiar with the cyber security incident response process
- Familiarity with AI tools and their application in automating security tasks and processes.
- Hands-on experience on performing incident response activities
- Have scripting experience like Bash, PowerShell, Python, Go, etc, and the ability to use these skills to aid in responding to incidents involving Windows, Linux, macOS, as well as cloud environment
- Have knowledge of cybersecurity tools and software like NGFW, EDR, IDS/IPS, EDR, DLP, SIEM, other log management platforms, etc.
- Be familiar with the MITRE ATT&CK Framework and/or Cyber Kill Chain
- Be passionate on exploring new technologies and having creative initiative to boost the team capabilities
- Holders of security related certifications is a plus (e.g.Azure , AWS, CISSP, GCIH, GCIA, GCFA, GNFA, GREM, or other equivalent)
- Awareness of regulatory and compliance requirements like GDPR, MAS, PSD2 etc is a plus.
- Fast learner with can do attitude and ready to get the hands dirty
- A strong team player who can collaborate with compassion
- Passionate to learn and willing to put in the extra effort
- Understand the concept of ownership and accountability coupled with sense of urgency and prioritisation
- Confidence in handling incidents and managing relevant senior and technical stakeholders
- Possess business acumen/mindset (not only technical) when making critical decisions
Incident Response Engineer
Publicado há 10 dias atrás
Trabalho visualizado
Descrição Do Trabalho
As a member of the ETMSA team at Crypto.com , you will be integral to responding to and managing cybersecurity threats and incidents throughout their lifecycle – from Preparation to Identification, Containment, Eradication, Recovery, and Lessons Learned – collaborating with a global team of incident responders.
You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), Intrusion Detection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more.
You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments.
Responsibilities- Report to Director to facilitate all phases in the incident response lifecycle
- Be involved in various incident prevention projects to improve Security posture
- Preparation:
- Understand different regulatory and compliance requirements like critical time to report, escalation flows, etc.
- Take part in self-assessment exercises like Tabletop Exercises, Attack Simulations, Red/Purple Team exercises to make sure the incident response process is working smoothly
- Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements
- Evaluate the incident response readiness of different layers - people, process, technology
- Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team.
- Respond to cyber security incidents in compliance with the local authority / regulatory requirements.
- Assess the risk, impact and scope of the identified security threats
- Perform deep-dive incident analysis of various data sources by analysing and investigating security related logs against medium-term threats and IOCs
- Communicate with the stakeholders and provide guidance, recommendations to contain and eradicate the security incident
- Participate in root cause analysis using forensic and other custom tools to identify any sources of compromise and/or malicious activities taking place.
- Document and present investigative findings for high profile events and other incidents of interest.
- Provide lessons learnt meeting to the stakeholders
- Lead and keep track on the follow-up activities
- Document the incident in the case management system and provide incident reports
- At least 5 years experience in the Cyber Security industry
- Strong technical and analytical skills
- Familiar with the cyber security incident response process
- Familiarity with AI tools and their application in automating security tasks and processes.
- Hands-on experience on performing incident response activities
- Have scripting experience like Bash, PowerShell, Python, Go, etc, and the ability to use these skills to aid in responding to incidents involving Windows, Linux, macOS, as well as cloud environment
- Have knowledge of cybersecurity tools and software like NGFW, EDR, IDS/IPS, EDR, DLP, SIEM, other log management platforms, etc.
- Be familiar with the MITRE ATT&CK Framework and/or Cyber Kill Chain
- Be passionate on exploring new technologies and having creative initiative to boost the team capabilities
- Holders of security related certifications is a plus (e.g.Azure , AWS, CISSP, GCIH, GCIA, GCFA, GNFA, GREM, or other equivalent)
- Awareness of regulatory and compliance requirements like GDPR, MAS, PSD2 etc is a plus.
- Fast learner with can do attitude and ready to get the hands dirty
- A strong team player who can collaborate with compassion
- Passionate to learn and willing to put in the extra effort
- Understand the concept of ownership and accountability coupled with sense of urgency and prioritisation
- Confidence in handling incidents and managing relevant senior and technical stakeholders
- Possess business acumen/mindset (not only technical) when making critical decisions
INCIDENT RESPONSE SPECIALIST
Publicado há 10 dias atrás
Trabalho visualizado
Descrição Do Trabalho
3000 - 36000 a year (Philippine Pesos)
DescriptionQualifications:
- Experience in customer support, handling phone-based inquiries, and troubleshooting technical issues remotely.
- Strong data management skills to ensure accurate records and compliance with company procedures.
- Excellent communication skills to interact with customers, colleagues, vendors, and clients.
- Must meet client-required English proficiency standards.
- Willing to work shifting schedules, including weekends and U.S./Philippine holidays.
- Onsite work arrangement in Cabuyao City, Laguna.
Incident Response Engineer
Publicado há 10 dias atrás
Trabalho visualizado
Descrição Do Trabalho
6 days ago Be among the first 25 applicants
As a member of the ETMSA team at Crypto.com , you will be integral to responding to and managing cybersecurity threats and incidents throughout their lifecycle – from Preparation to Identification, Containment, Eradication, Recovery, and Lessons Learned – collaborating with a global team of incident responders.
You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), Intrusion Detection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more.
You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments.
Responsibilities
- Report to Director to facilitate all phases in the incident response lifecycle
- Be involved in various incident prevention projects to improve Security posture
Preparation:
- Understand different regulatory and compliance requirements like critical time to report, escalation flows, etc.
- Take part in self-assessment exercises like Tabletop Exercises, Attack Simulations, Red/Purple Team exercises to make sure the incident response process is working smoothly
Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements
- Evaluate the incident response readiness of different layers - people, process, technology
Detection & Analysis:
- Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team.
- Respond to cyber security incidents in compliance with the local authority / regulatory requirements.
- Assess the risk, impact and scope of the identified security threats
- Perform deep-dive incident analysis of various data sources by analysing and investigating security related logs against medium-term threats and IOCs
Containment, Eradication and Recovery:
- Communicate with the stakeholders and provide guidance, recommendations to contain and eradicate the security incident
- Participate in root cause analysis using forensic and other custom tools to identify any sources of compromise and/or malicious activities taking place.
- Document and present investigative findings for high profile events and other incidents of interest.
- Provide lessons learnt meeting to the stakeholders
- Lead and keep track on the follow-up activities
- Document the incident in the case management system and provide incident reports
Always ready to jump in, in the event of security incidents.
As a member of the ETMSA team at Crypto.com , you will be integral to responding to and managing cybersecurity threats and incidents throughout their lifecycle – from Preparation to Identification, Containment, Eradication, Recovery, and Lessons Learned – collaborating with a global team of incident responders.
You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), Intrusion Detection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more.
You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments.
Responsibilities
- Report to Director to facilitate all phases in the incident response lifecycle
- Be involved in various incident prevention projects to improve Security posture
Preparation:
- Understand different regulatory and compliance requirements like critical time to report, escalation flows, etc.
- Take part in self-assessment exercises like Tabletop Exercises, Attack Simulations, Red/Purple Team exercises to make sure the incident response process is working smoothly
Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements
- Evaluate the incident response readiness of different layers - people, process, technology
Detection & Analysis:
- Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team.
- Respond to cyber security incidents in compliance with the local authority / regulatory requirements.
- Assess the risk, impact and scope of the identified security threats
- Perform deep-dive incident analysis of various data sources by analysing and investigating security related logs against medium-term threats and IOCs
Containment, Eradication and Recovery:
- Communicate with the stakeholders and provide guidance, recommendations to contain and eradicate the security incident
- Participate in root cause analysis using forensic and other custom tools to identify any sources of compromise and/or malicious activities taking place.
- Document and present investigative findings for high profile events and other incidents of interest.
Post incident activities:
- Provide lessons learnt meeting to the stakeholders
- Lead and keep track on the follow-up activities
- Document the incident in the case management system and provide incident reports
Always ready to jump in, in the event of security incidents.
Requirements- At least 5 years experience in the Cyber Security industry
- Strong technical and analytical skills
- Familiar with the cyber security incident response process
- Familiarity with AI tools and their application in automating security tasks and processes
- Hands-on experience on performing incident response activities
- Have scripting experience like Bash, PowerShell, Python, Go, etc, and the ability to use these skills to aid in responding to incidents involving Windows, Linux, macOS, as well as cloud environment
- Have knowledge of cybersecurity tools and software like NGFW, EDR, IDS/IPS, EDR, DLP, SIEM, other log management platforms, etc
- Be familiar with the MITRE ATT&CK Framework and/or Cyber Kill Chain
- Be passionate on exploring new technologies and having creative initiative to boost the team capabilities
- Holders of security related certifications is a plus (e.g.Azure, AWS, CISSP, GCIH, GCIA, GCFA, GNFA, GREM, or other equivalent)
- Awareness of regulatory and compliance requirements like GDPR, MAS, PSD2 etc is a plus
- Fast learner with can do attitude and ready to get the hands dirty
- A strong team player who can collaborate with compassion
- Passionate to learn and willing to put in the extra effort
- Understand the concept of ownership and accountability coupled with sense of urgency and prioritisation
- Confidence in handling incidents and managing relevant senior and technical stakeholders
- Possess business acumen/mindset (not only technical) when making critical decisions
- Seniority level Not Applicable
- Employment type Full-time
- Job function Engineering and Information Technology
Referrals increase your chances of interviewing at Crypto.com by 2x
Sign in to set job alerts for “Enterprise Threat Management and Security Architecture (ETMSA) Engineer” roles. Pre-Sales Engineer, Solution Engineering - LATAM Senior Technical Solutions Engineer - Platform Solutions Design Engineer, Solution Eng Team Software Engineer, Enterprise Data Foundations Solutions Engineer - SME Identity, LATAM Senior Data Engineer - AI, Insights & SolutionsWe’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrIncident response (híbrido)
Ontem
Trabalho visualizado
Descrição Do Trabalho
Empresa portuguesa contratapara trabalho híbrido
Localização:Maia, Portugal (modelo híbrido 2 a 3 dias/semana no escritório)
É necessário que os candidatos para a vaga já estejam em Portugal
Requisitos de Idioma: Portuguêsfluente
Tempo de experiência: 5 anos de experiência em Cibersegurança
Cliente: Setor Privado | Indústria: Retalho
Instruções: Por favor, envieseu currículo, e certifique-se de incluir todas as habilidades e experiênciasque correspondem aos requisitos da oportunidade. Isso aumentarásignificativamente suas chances de sucesso.
___
Estamos à procura de um Especialista emResposta a Incidentes para integrar a equipa de cibersegurança de um cliente de referência no setor do retalho.Procuramos um perfil com experiência comprovada em gestão de vulnerabilidades econhecimentos técnicos sólidos em resposta a incidentes.
· Atuar na gestãode vulnerabilidades, incluindo identificação, avaliação, priorização emitigação
· Utilizar ferramentas de scanning como Qualys, Tenable, Rapid7 ou Nessus
· Aplicar normas e frameworks reconhecidas, como NIST, ISO 27001 e CIS Controls
· Interpretar classificadores de vulnerabilidadescomo CVE, CVSS e advisories defabricantes
· Apoiar os processos de resposta a incidentes, desde a investigação àrecuperação
· Analisar sistemas operativos (Windows, Linux) eredes para suporte às operações de segurança
· Contribuir com scripting básico (Python, PowerShell, SQL) quandonecessário
· Experiênciacomprovada em gestão de vulnerabilidades
· Familiaridade com ferramentas de scanning e gestão de vulnerabilidades(pelo menos uma das seguintes: Qualys, Tenable, Rapid7, Nessus)
· Conhecimento prático de frameworks de segurança e classificadores de risco (CVE,CVSS, NIST, etc.)
· Experiência ou conhecimento aplicável em resposta a incidentes
· Conhecimentos de sistemas operativos (Windows, Linux) e redes
· Scriptingem Python, PowerShell ou SQL
· Capacidade analítica para transformar dadostécnicos em ações concretas
· Comunicação clara e eficaz, com aptidão paraelaborar relatórios técnicos
· Espírito crítico, foco em detalhe e capacidadede trabalhar em contexto multidisciplinar
Se reúne os requisitos acima, especialmente osobrigatórios, e procura um desafio com impacto direto na cibersegurança de umaorganização líder no mercado do retalho, envieo seu CV com os pontos obrigatórios bem evidenciados.
#CL/IG
Seja o primeiro a saber
Sobre o mais recente Analyst security operation center iii (soc) Empregos em Brasil !
Senior Manager, Cyber Digital Forensics and Incident Response
Publicado há 10 dias atrás
Trabalho visualizado
Descrição Do Trabalho
Cybersecurity
Cybersecurity | Sao Paulo, Brazil | 21012270
Senior Manager, Cyber Digital Forensics and Incident ResponseCybersecurity | Sao Paulo, Brazil | 21012270
We are looking for talented individuals with solid knowledge of Digital Forensics and Incident Response to join our Cyber & Data Resilience Practice as a Senior Manager! As a Senior Manager at Kroll, you will provide support and guidance to a wide variety of clients in managing their Incident Response Engagement. You will work alongside accomplished senior staff, enhancing your own DFIR expertise, while mentoring junior team members and delivering excellent service. You will be part of an award-winning and respected team supporting a global network of clients and colleagues.
Kroll’s elite security leaders deliver rapid responses for over 2,000 incidents per year and have the resources and expertise to support the entire incident lifecycle, including litigation demands.
Day-to-day Responsibilities
- Delivery of strong technical skills in support of cyber defense or incident response assignments.
- Supports the Case Manager in the effective running of an assignment through to its closure, providing input to structuring projects, managing resources, presenting findings and providing commercially viable advice to the client.
- Monitors quality of own work and that of the assignment team, and ensures value is delivered to the client.
- Communicates regularly to senior members of the team, bringing case issues and findings to attention of appropriate personnel for resolution and decision making.
- Develop and maintain key client relationships, ensuring Kroll’s high standards of service and integrity are adhered to at all times.
- Support the development of junior staff by acting as mentor and ensuring Kroll’s high standards are met at all times.
- Ensure Key Performance Indicators (consisting of utilization rates, business generation and personal objectives) are consistently achieved.
- Identify own learning needs and opportunities, and continuously seek to improve personal performance.
- We are currently looking for individuals that hold the following skill and expertise:
- Incident Response
- Computer Forensics
- Network Security
- Computer Security Audit
- The individual must possess excellent project management skills, with ability to communicate effectively and build strong working relationships with both clients and colleagues across Kroll’s network of offices.
- Recommended five (5) years incident response experience investigating and remediating cyberbreaches, preferably in a consultancy position.
- Desired qualifications: CREST IR, CFCE, ENCE, GIAC or other certification(s) would be beneficial (GCFA, GCIH, GREM, GNFA).
- Fluency in English is required together with fluency or native capability in the language of the country in which they will be based. Another European or Arabic language would be advantageous.
- Extensive experience of managing complex cases and successfully managing resources and budget.
- Ability to drive forward and co-ordinate a number of concurrent projects and tasks, managing competing demands.
- Clarity of thought and expression to win confidence from key stakeholders and colleagues.
- A highly professional and commercial approach to problem solving.
- Due to the range of assignments that you will manage across various industry-sectors and country locations, a key interest in global events and markets, with an awareness of working across different cultural and political environments is essential.
- Excellent written and verbal communication skills that help represent diverse communities.
- Experience working with diverse teams.
About Kroll
Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore, and maximize our clients’ value? Your journey begins with Kroll.
In order to be considered for a position, you must formally apply via careers.kroll.com.
Kroll is committed to equal opportunity and diversity, and recruits people based on merit.
Kroll is headquartered in New York with offices around the world.Sign up to receive periodic news, reports, and invitations from Kroll.Our privacy policy describes how your data will be processed.
2025 Kroll, LLC. All rights reserved.Kroll is not affiliated with Kroll Bond Rating Agency,Kroll OnTrack Inc. or their affiliated businesses. Read more .
Kroll is committed to providing equal opportunities in employment. We will not discriminate between applications for reason of gender, race, religion, color, nationality, ethnic origin, sexual , marital status, gender identity, veteran status, age or disability.
If you are an individual with disabilities who needs accommodation or you are having difficulty using our website to apply for employment, please contact Jeff Kosinat +1 . This contact information is for accommodation requests only and cannot be used to inquire about status of an application.
Clickhere to view a video regarding self-identification of individuals with disabilities or those requesting accommodation.
Applicants and employees notice ofEEO rights are available in our office and onlinehere.
Clickhere to read our Pay Transparency Policy.
Senior Manager, Cyber Digital Forensics and Incident Response
Publicado há 10 dias atrás
Trabalho visualizado
Descrição Do Trabalho
We are looking for talented individuals with solid knowledge of Digital Forensics and Incident Response to join our Cyber & Data Resilience Practice as a Senior Manager! As a Senior Manager at Kroll, you will provide support and guidance to a wide variety of clients in managing their Incident Response Engagement. You will work alongside accomplished senior staff, enhancing your own DFIR expertise, while mentoring junior team members and delivering excellent service. You will be part of an award-winning and respected team supporting a global network of clients and colleagues.
Kroll’s elite security leaders deliver rapid responses for over 2,000 incidents per year and have the resources and expertise to support the entire incident lifecycle, including litigation demands.
Day-to-day Responsibilities
- Delivery of strong technical skills in support of cyber defense or incident response assignments.
- Supports the Case Manager in the effective running of an assignment through to its closure, providing input to structuring projects, managing resources, presenting findings and providing commercially viable advice to the client.
- Monitors quality of own work and that of the assignment team, and ensures value is delivered to the client.
- Communicates regularly to senior members of the team, bringing case issues and findings to attention of appropriate personnel for resolution and decision making.
- Develop and maintain key client relationships, ensuring Kroll’s high standards of service and integrity are adhered to at all times.
- Support the development of junior staff by acting as mentor and ensuring Kroll’s high standards are met at all times.
- Ensure Key Performance Indicators (consisting of utilization rates, business generation and personal objectives) are consistently achieved.
- Identify own learning needs and opportunities, and continuously seek to improve personal performance.
Essential Traits:
- We are currently looking for individuals that hold the following skill and expertise:
- Incident Response
- Computer Forensics
- Network Security
- Computer Security Audit
- The individual must possess excellent project management skills, with ability to communicate effectively and build strong working relationships with both clients and colleagues across Kroll’s network of offices.
- Recommended five (5) years incident response experience investigating and remediating cyberbreaches, preferably in a consultancy position.
- Desired qualifications: CREST IR, CFCE, ENCE, GIAC or other certification(s) would be beneficial (GCFA, GCIH, GREM, GNFA).
- Fluency in English is required together with fluency or native capability in the language of the country in which they will be based. Another European or Arabic language would be advantageous.
- Extensive experience of managing complex cases and successfully managing resources and budget.
- Ability to drive forward and co-ordinate a number of concurrent projects and tasks, managing competing demands.
- Clarity of thought and expression to win confidence from key stakeholders and colleagues.
- A highly professional and commercial approach to problem solving.
- Due to the range of assignments that you will manage across various industry-sectors and country locations, a key interest in global events and markets, with an awareness of working across different cultural and political environments is essential.
- Excellent written and verbal communication skills that help represent diverse communities.
- Experience working with diverse teams.
About Kroll
Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore, and maximize our clients’ value? Your journey begins with Kroll.
In order to be considered for a position, you must formally apply via careers.kroll.com.
Kroll is committed to equal opportunity and diversity, and recruits people based on merit.
#LI-CN1
#LI-Hybrid
#J-18808-LjbffrSecurity Operations - Manager
Publicado há 2 dias atrás
Trabalho visualizado
Descrição Do Trabalho
#SomosMaisNaTIM Fazer parte da TIM é se conectar com o que acreditamos e ter MAIS sintonia com todo o TIMe. É aprender novas formas de oferecer ao mundo um trabalho com MAIS propósito. Aprendizado na TIM é MAIS que possibilidade. É o que nos move a fazer MAIS e melhor. É desenvolver habilidades com criatividade e transformar tecnologia em MAIS liberdade. Tecnologia na TIM é MAIS que ter a melhor cobertura. É imaginar as possibilidades com MAIS inovação, conectando todos e todas, com respeito e agilidade. Diversidade e Inclusão na TIM é MAIS que abraçar. É uma cultura cada vez MAIS essencial para o nosso dia a dia. É criar um impacto MAIS positivo sendo quem você é. Vem ser você e fazer parte de um TIMe que tem a coragem para inovar, a liberdade para tentar e a vontade de fazer a diferença na vida das pessoas. #imagineaspossibilidades #LI-JS1
Valorizamos a candidatura de Pessoas com deficiência, Pessoas negras, Pessoas LGBTI+, Pessoas 45+ e Mulheres!
Main responsibilities
- Criar e implementar políticas e procedimentos de segurança que atendam às necessidades da empresa, garantindo conformidade com normas e regulamentações;
- Criar e implementar planos de segurança personalizados que atendam às necessidades específicas de cada executivo ou situação, incluindo rotas seguras e procedimentos de emergência;
- Supervisionar e coordenar as equipes de segurança, incluindo administrativo, vigilantes, motoristas, bombeiros, recepcionistas e outros profissionais, garantindo que todos executem bem as atividades, treinados e preparados para agir em situações de emergência;
- Realizar avaliações de risco para identificar vulnerabilidades e desenvolver estratégias para mitigá-las em caso de eventos, mudanças nas operações ou novas instalações relacionadas à segurança das pessoas e dos ativos;
- Supervisionar os sistemas de segurança como câmeras de vigilância, alarmes e controle de acesso, garantindo que estejam funcionando adequadamente;
- Promover treinamentos regulares para as equipes e colaboradores da empresa sobre práticas de segurança, direção eficiente (dirigibilidade) e procedimentos de emergência;
- Coordenar a resposta a incidentes de segurança, investigando ocorrências e implementando ações corretivas para evitar recorrências;
- Desenvolver e coordenar respostas a incidentes de segurança, garantindo que haja um plano de ação claro em caso de ameaças ou emergências;
- Manter frequente alinhamento e comunicação com os órgãos de segurança pública e outras entidades relevantes para garantir uma resposta rápida a incidentes;
- Elaborar relatórios sobre incidentes de segurança, atividades da equipe e eficácia das medidas implementadas, apresentando recomendações para melhorias;
- Controlar o orçamento da área de segurança, garantindo que os recursos sejam utilizados de forma eficiente;
- Oferecer orientação a liderança imediata sobre questões de segurança, ajudando a integrar a segurança nas operações e na cultura organizacional;
- Acompanhar o mercado e suas melhores práticas organizacionais e tecnológicas;
- Acompanhar a segurança dos eventos corporativos;
- Gerenciar a frota executiva;
- Representar a empresa nos assuntos referente à segurança empresarial.
Requirements and skills
- Experiência na área de segurança empresarial, contemplando patrimonial, logística e pontos de vendas no setor de telecomunicações;
- Formação Superior preferencialmente em segurança privada ou em áreas relacionadas a Administração.
Additional information
Valorizamos a candidatura de Pessoas com deficiência, Pessoas negras, Pessoas LGBTI+, Pessoas 45+ e Mulheres!
Na TIM, o seu bem-estar é o nosso bem-estar, por isso o programaConexão Bem + Estar tem o propósito defortalecer o cuidado genuíno da TIM com o TIMe e suas famílias , por meio de iniciativas práticas em diversas frentes para todos e todas estarem sempre bem, na vida pessoal e profissional.
Fique por dentro dos nossos benefícios:
• Programa de Benefícios Flexíveis
• Assistência Médica e Odontológica *
• Benefício Medicamentos *
• Wellhub (ex-Gympass) *
• Vale Alimentação e/ou Refeição
• Programa de Bem-Estar Financeiro
• Previdência Privada
• Aparelho celular com Internet Ilimitada e franquia de Voz
• Convênios e Parcerias com mais de 3.000 empresas e instituições, incluindo parcerias para desconto na sua conta de luz e internet banda larga
• Curso de inglês online extensível a 1 familiar ou amigo
• Programa de Treinamento e Capacitação Internos
• Participação nos Lucros
• Meu primeiro benefício - Auxílio para filhos até 2 anos de idade
• Reembolso Creche (para pais ou mães)
• Modelos de trabalho e jornada flexíveis
• Happy Day - Dia de folga no mês do aniversário
• Licenças estendidas para maternidade, paternidade, casamento e adoção
• Vale Transporte
E outros!
* Extensível a dependentes legais
#J-18808-Ljbffr