About the job
TRR have been commissioned to identify multiple Cyber Security Analysts for a long term position working for the the European Institutions.
DESCRIPTION
Required Expertise
- Log management and SIEM solutions: Splunk and Cribl
- Security architecture and design of cybersecurity solutions
- Security events monitoring, management, and analysis and SIEM design.
- Container orchestration
- Network concepts and associated security solutions. In particular:
- Internet/Intranet/Extranet, authentication systems, Firewall, Proxies, Network
- IDS/IPS, e-mail gateways, IP security, Remote access control
- Windows Security:
- Windows workstation hardening
- Windows server hardening
- Windows Active Directory management and Security
- Logs collection, filtering, aggregation, and processing
- Linux Security:
- Linux management and hardening
- Linux workstations and servers monitoring (logs gathering and processing)
- Cloud environment; familiar with:
- Microsoft cloud environments and security tools (Sentinel, EntraID, Defender, etc.)
- AWS cloud environments and security tools (GuardDuty, Security hub, etc.)
Key Responsibilities
- Design, install and operate various cybersecurity solutions:
- Event log management and analytics: Splunk Enterprise, Cribl Stream Enterprise
- Incident Management and Response: various solutions and tools, running as containers in Hashicorp Nomad
- Manage changes in a structured and controlled way
- Regularly review and keep all solutions up to date
- Under the supervision of the Head of Service, he will contribute to all aspects of security design, deployment, and operation of all cybersecurity solutions under the responsibility of the unit
- Draft documentation:
- Design documentation of implemented solutions
- Operating procedures
- Interact regularly with the management and other ICT operations teams (network, data center, applications, and others):
- ensure proper and timely implementation of solutions
- ensure that requirements from different teams are considered
- escalate potential issues that can reduce the cybersecurity of the organization or jeopardize implementation of solutions