Group Cybersecurity SOC L2 Analyst at Capgemini
Ciudad de México, CDMX, Mexico -
Full Time


Start Date

Immediate

Expiry Date

08 Jun, 25

Salary

0.0

Posted On

09 Mar, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Security Operations Center, System Solutions, Cissp, Design, Soft Skills, Integration

Industry

Information Technology/IT

Description

SOFT SKILLS:

  • Profit Shaper
  • Business Builder
  • People developer
  • Active Connector
  • Agile Player

What can YOU expect in a career with Capgemini?

  • Working in a team environment, Consultants will focus on the analysis, design and development of technology-based solutions for Capgemini’s clients.
  • You will work alongside technical, functional and industry specialists to assist with the development, implementation and integration of innovative system solutions including methods, techniques and tools.
  • You will contribute to client satisfaction by providing timely and responsive value-added services and work products.
  • Capgemini offers a competitive compensation and benefits package.
  • Headquartered in Paris, France, Capgemini has a presence of more than 340 thousand professionals in Mexico distributed among 3 sites located in Mexico City, Monterrey and Aguascalientes. A deeply multicultural organization.
  • Capgemini has developed its own way of working, the Collaborative Business ExperienceTM, and draws on Rightshore, its worldwide delivery model.
Responsibilities
  • You will be working within a follow-the-sun team located internationally as Group Cybersecurity Operations. Your primary role would be to support and coordinate global and internal initiatives within the CDU.
  • In your primary role you would be responsible for the end-to-end management of cybersecurity alerts and incidents, covering all elements of the incident response lifecycle including identification, containment, and eradication. You will work with the wider team to ensure effective management and response to cybersecurity incidents.
  • Excellent communication skills (both spoken and written English), including the ability to write comprehensive incident reports and clearly articulate technical messages to a variety of audiences
  • Strong attention to detail and the ability to handle multiple competing priorities and simultaneous cases in a fast-paced environment
  • Experience of SOC monitoring and intrusion detection systems (such as Falcon CrowdStrike, Splunk ES, and VirusTotal Enterprise), management and responding to and the tuning of alerts
  • A general understanding of the cybersecurity industry, such as the threat landscape, cyber kill chain, and NIST Incident response life cycle
  • Understanding of a wide range of information security and IT methodologies, principles, technologies and techniques
Loading...