IT Security Analyst 3
Guadalajara/Zapopan, Mexico
hace 9 días

Preferred Qualifications

What You Will Do

•Play a key role in security technology selection,deployment;

•Research,design, and advocate new technologies, architectures, and security productsthat will support security requirements for the cloud and cloud-enabledproducts

•Playa key role in projects through design, pilot and deployment for new securitysolutions across a large-scale production cloud environment;

•Actas a last level of escalation for the operation teams and engage vendors wherenecessary;

•Collaboratewith other teams as required;

•Document,communicate, conform and improve processes related to security;

•Providementorship in your technical domain, including presenting on topics related toinformation security

•Communicate,lead, and influence colleagues in information security best practices;

•Contribute to greater IT securityroadmap

•Keep up to date with existing securitythreats and evolve network security posture accordingly


•BSin Computer Science, Engineering

•3+years of experience with networking, infrastructure, or systems administrationin at least one of the following areas: Linux, UNIX, Windows, TCP/IPnetworking, security fundamentals.

•3+years of experience with network layers 2-7, network services, and/or systemsmanagement including virtualization and cloud technologies with a focus onsecurity, high availability, encryption, automation using Python and otherscripting languages

•Solidunderstanding of network services, vulnerabilities, and attacks;

•Knowledgeof SIEM tools / Log Analysis and IDS/IPS sollutions

•Abilityto work independently and pro-actively contribute in a global team environment;

•Excellentinterpersonal, organizational, documentation, and communication skills; able toconcisely communicate security risks to both technical and business audiences;


•3+years of experience with supporting at least one of the following technologies:Cisco switches / routers, IDS/IPS (FireEye, SIEM (IBM QRadar, Splunk, McAfee..) , network visibility solutions (IXIA, Gigamon, etc.)

•3+years of experience in 2 or more of the following Security Operations Centertechnologies/applications:


üConfigurationCompliance Scanning

üIntrusionPrevention Solutions


üFirewallpolicy management

üSecuredatabase applications





•Knowledgeof Network Intrusion Detection Systems and exploits / vulnerabilities;

•Strong grasp of informationsecurity fundamentals including secure communications, encryption, andnetworking and security compensating controls;

•Ableto demonstrate significant depth of understanding in one or more securityfields;

•Excellent interpersonal,organizational, documentation, and communication skills; able to conciselycommunicate security risks to both technical and business audiences;

•Demonstrate ability tomethodically locate assets with limited information by leveraging coreenterprise resources (including ARP tables, MAC addresses, DNS, etc.);

•CISSPand/or Certifications networking or information security

Nice to have:

Experience in one or more of the following:

üState and configuration automationtools like Puppet, Chef, Ansible

üKnowledge of building anddeploying with Container tools: Docker Container Managementand Registries, Kubernetes management

üContinuous integration orchestratorslike Jenkins, Octopus Deploy

Detailed Description and Job Requirements

Executes security controls to prevent hackers from infiltrating company information or jeopardizing e-commerce programs.

Researches attempted efforts to compromise security protocols. Maintains security systems for routers and switches. Administers security policies to control access to systems. Maintains the company*s firewall. Uses applicable encryption methods. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.

Job duties are varied and complex; independent judgment needed. May have project lead role. Prefer 5 years relevant experience and BA/BS degree.


:Information Technology
Añadir a los favoritos
Eliminar de mis favoritos
Mi Correo Electrónico
Al hacer clic en la opción "Continuar", acepto que neuvoo recolecte y procese mis datos de conformidad con lo establecido en su Política de privacidad . Tengo derecho a darme de baja o retirar mi autorización en cualquier momento.
Formulario de postulación