返回搜索结果
Mid- Level IAM Analyst
地区 Bogotá, Edificio Palo verde - Avenida 19 # 96-07
发布 5 几天前
职位类型 Regular
参考 R099540
五个人坐在一张灰色的沙发上,后面有一排抽象画框。从左到右。一个黑人女人坐在沙发的扶手上。她穿着黑色T恤和红色裙子。接下来是一个白人男性,穿着蓝色牛仔裤和海军蓝衬衫。中间是一个金发女士,穿着亮粉色衬衫、牛仔裤和白色运动鞋。第四个是另一个男人,也穿着海军蓝衬衫和蓝色牛仔裤。坐在沙发另一扶手上的是一个穿着黑色牛仔裤、白色运动鞋和棕色上衣的女人。

Role Overview

We are hiring a Mid-Level IAM Analyst to join our cybersecurity team. This role is responsible for support for orchestrating and responding to incidents, following processes, playbooks, and best practices create process, configurating tools and improving IAM subjects to company.

The professional will work closely with other security fronts, infrastructure, systems, and business teams, evaluating improvements and adjustments necessary for the effectiveness of the incident response process, as well as supporting the organization's Cyber ​​Defence strategy of IAM Program.

 

Key Responsibilities

• Support, implement, and maintain identity and access management processes, including provisioning, revocation, and periodic privilege reviews;

• Management of IAM-related tools, ensuring functionality, reliability, and compliance with security requirements;

• Create, review, and optimize access rules, profiles, groups, and policies, ensuring the application of principles such as least privilege and SoD (Segregation of Duties) for on-premises and cloud environments;

• Support integrating systems and applications with IAM platforms;

• Collaborate with other teams to map access processes, identify risks, and recommend control implementations or automations;

• Support internal teams in understanding identity and access management practices and related security requirements;

• Support audit processes, continuously monitor security alerts generated by the SIEM.

• Analyze security events from different sources (proxy, firewall, XDR, Cloud, database, DLP, among others) in order to identify possible incidents or violations, suspicious activities, or indicators of compromise (IOCs).

• Ability to write incident reports containing evidence, root cause analysis, action plan, and address issues with the responsible teams.

• Handling N2 and N3 incidents.

• Identify false positives, correlate events, and propose improvements to controls.

• Suggest and develop new SOAR playbooks.

• Contribute to the continuous evolution of monitoring, refinement of rules, and producing KPIs on MTTD (Mean Time to Detection), MTTR (Mean Time to Remediation), and False Positive Rate.

• Configure, create, and review security policies, operational playbooks, and exceptions in defense solutions (XDR, SIEM, SOAR, Email Protection, and other security tools).

• Conduct security investigations and threat hunting activities through in-depth analysis of logs, alerts, and telemetry, identifying anomalous behaviors, possible indicators of compromise, and potential early-stage threats. 

 

 

 Required Skills & Experience

• At least 3 years of direct experience with IAM-related topics;

• Knowledge about AD/Entra ID, LDAP, SAML, OAuth, SSO, MFA, PAM, SoD, RBAC, Principle of Least Privilege and access reviews;

• Experience management IAM tools;

• Knowledge of Defender for Identity and other IAM tools for hybrid and multicloud environments (On-Prem, Azure, AWS, GCP);

• Fluency in English;

• Knowledge of information security standards and best practices (e.g., ISO 27001, NIST, etc.).

• At least 5 years of experience in SOC/CSIRT teams, working with information security monitoring and incident response, and digital fraud investigation.

• Proficiency in networks, protocols, and logs (firewall, proxy, DNS, syslog, endpoint, cloud, etc.).

• Experience with SIEM, EDR/XDR, DLP, WAF, IDS/IPS, FW, etc. solutions.

• Familiarity with MITRE ATT&CK, OWASP Top 10, CVSS, NIST CSF, and major attack scenarios, whether at the network level, application level, social engineering, ransomware and various malware, fraud, among others.

• Experience in event correlation and alert triage.

• Relevant certifications (e.g., Security+, CEH, CHFI) are highly desirable.

• Fluency in English.

• Ability to orchestrate incidents, escalating to technology teams and other stakeholders.

• Practical knowledge of CrowdStrike Falcon, Microsoft Defender for Cloud, Defender for Endpoint, Microsoft Sentinel, and Defender for 365 solutions for monitoring, analysis, tuning, use case creation, and operational responses within these platforms.

 

Preferred Qualifications

• Knowledge of scripts and automations, integration of new tools into SIEM.

• Knowledge of Threat Intel, to enrich the SOC, understanding of tools and techniques used in attacks (TTPs), investigations of IOCs, IOAs, data breach investigations, etc.

• Participation in Purple Team exercises and/or attack simulations to enrich threat detection methods.

• Certifications in CrowdStrike and Microsoft solutions.

 

• Relevant certifications from IAM/PAM solution providers, for example: (CyberArk, Senha Segura, BeyondTrust, SailPoint, Okta, Microsoft EntraID, etc).

立即申请
返回搜索结果