LOG IN
SIGN UP
Canary Wharfian - Online Investment Banking & Finance Community.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Canary Wharfian
OR continue with e-mail and password
E-mail address
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

Job Details

Santander CIB logo
Investment Banking

Security Monitoring Analyst

at Santander CIB

ExperiencedNo visa sponsorship

Posted 17 days ago

No clicks

Join Santander's Cyber Fusion Center as a Security Monitoring Analyst responsible for monitoring security events and indicators of attack across Windows, Unix, routers, switches and endpoints. You will triage and investigate alerts from SIEM and other security tools (Splunk, McAfee DLP), reduce false positives, and design correlation searches to improve detection. This role requires 5-7 years of experience, a strong adversarial mindset, coaching/mentorship skills, and fluency in English and Spanish.

Compensation
Not specified

Currency: Not specified

City
Not specified
Country
Mexico

Full Job Description

Security Monitoring Analyst

Country: Mexico

The Security Monitoring Analyst would join the Cyber Fusion Center (CFC) and work to monitor for indicators of attack and improve our processes and procedure. A successful candidate for this role will have experience reviewing security events from multiple systems (Windows, Unix, routers, switches and endpoints) and be able to understand what events are benign and what may be malicious based on data classification, behavior and context. While this role focuses heavily on review and triage of events, a successful candidate will also know how to design and implement correlation searches to respond to changes in the environment and reduce false positives.

Experience:

  • 5-7 years of cyber security monitoring experience
  • Skilled with Splunk searches and queries
  • Strong adversarial mindset (think like an attacker)
  • Coaching and mentorship skills
  • Monitor and detect security events from SIEM, Log collection Engines and other security technologies, such as Splunk and McAfee DLP
  •  Perform investigations using security platforms to determine false positives or escalate (i.e. IDS/IPS, DLP, etc.)
  •  Monitoring of health alerts and downstream dependencies
  •  Review and take a proactive approach to false positive and work with other teams to improve accuracy of the alerts
  •  Document, investigate and notify appropriate contact for security events and response Collaborate with technical teams for security incident remediation and communication
  •  Conduct security research on threats and remediation methods
  •  Prepares system security reports by collecting, analyzing, and summarizing data and trends; presents reporting for management revie
  • Fluent in English and Spanish

Job Details

Santander CIB logo
Investment Banking

17 days ago

clicks

Security Monitoring Analyst

at Santander CIB

ExperiencedNo visa sponsorship

Not specified

Currency not set

City: Not specified

Country: Mexico

Join Santander's Cyber Fusion Center as a Security Monitoring Analyst responsible for monitoring security events and indicators of attack across Windows, Unix, routers, switches and endpoints. You will triage and investigate alerts from SIEM and other security tools (Splunk, McAfee DLP), reduce false positives, and design correlation searches to improve detection. This role requires 5-7 years of experience, a strong adversarial mindset, coaching/mentorship skills, and fluency in English and Spanish.

Full Job Description

Security Monitoring Analyst

Country: Mexico

The Security Monitoring Analyst would join the Cyber Fusion Center (CFC) and work to monitor for indicators of attack and improve our processes and procedure. A successful candidate for this role will have experience reviewing security events from multiple systems (Windows, Unix, routers, switches and endpoints) and be able to understand what events are benign and what may be malicious based on data classification, behavior and context. While this role focuses heavily on review and triage of events, a successful candidate will also know how to design and implement correlation searches to respond to changes in the environment and reduce false positives.

Experience:

  • 5-7 years of cyber security monitoring experience
  • Skilled with Splunk searches and queries
  • Strong adversarial mindset (think like an attacker)
  • Coaching and mentorship skills
  • Monitor and detect security events from SIEM, Log collection Engines and other security technologies, such as Splunk and McAfee DLP
  •  Perform investigations using security platforms to determine false positives or escalate (i.e. IDS/IPS, DLP, etc.)
  •  Monitoring of health alerts and downstream dependencies
  •  Review and take a proactive approach to false positive and work with other teams to improve accuracy of the alerts
  •  Document, investigate and notify appropriate contact for security events and response Collaborate with technical teams for security incident remediation and communication
  •  Conduct security research on threats and remediation methods
  •  Prepares system security reports by collecting, analyzing, and summarizing data and trends; presents reporting for management revie
  • Fluent in English and Spanish