Cybersecurity Engineer L2 with LINUX
Job Description
The Level 2 (L2) Security Analyst plays a crucial role in the cybersecurity operations centre by dealing with incidents of greater complexity and sophistication. His primary responsibility is to conduct advanced threat analysis, using detailed investigative and forensic techniques to understand the root cause and extent of incidents. This professional coordinate the response to critical events, escalating problems to specialized teams and ensuring efficient management of the incident from detection to resolution.
Key Responsibilities
- Distributed File System: QTrees and security groups creation along with assignment to SVMs, Shares, etc
- Advanced Analysis: Perform deeper and more detailed analysis of incidents, evaluating sophistication and potential impact compared to level 1.
- Specialized Escalation: Handle incidents of greater complexity, escalating to higher levels and coordinating with specialized teams when necessary.
- Forensic Investigation: Conduct forensic investigations to determine the root cause of incidents and collect evidence for possible legal action.
- Signature and Rule Development: Create and update signatures, rules, and behavioural profiles in detection tools to improve accuracy and effectiveness.
- Technical Advice: Provide technical advice to level 1 analysts, helping in the understanding and resolution of more complex incidents.
- Tool Optimization: Collaborate in the improvement and optimization of security tools, proposing adjustments and updates to keep up with threats.
- Critical Incident Management: Coordinate the response to critical incidents, ensuring efficient execution of mitigation and recovery plans.
- Review of Security Policies: Evaluate and update security policies and procedures, ensuring their alignment with best practices and regulations.
Job Description - Grade Specific
Required Skills
- Proficient knowledge in administering Linux systems, preferably Red Hat Enterprise Linux (RHEL)
- Solid knowledge of cybersecurity principles and practical experience implementing security measures
- Practical experience in:
- Distributed File System (DFS)
- SIEM operation & tooling (Microsoft Sentinel, IBM QRadar, Splunk, Chronicle).
- EDR operation & tooling (MS Defender, Symantec, CrowdStrike Falcon among others).
- Strong understanding of TCP/IP networking, firewalls, and general network communication principles
- Strong analytical and problem-solving skills
- Excellent written and verbal communication skills.
- High ability to multi-task, prioritize, coordinate, work well under pressure and meet deadlines.
- Experience in incident, problem management, and/or change management.
Langreo, ES