Claranet

Cybersecurity Analyst, Mid-Level

Claranet

full-time

Posted on:

Location Type: Hybrid

Location: CampinasBrasil

Visit company website

Explore more

AI Apply
Apply

Tech Stack

About the role

  • Monitor and investigate alerts in Microsoft Sentinel (SIEM) and manage security policies in Azure AD/Entra ID and Intune.
  • Operate and tune WAF rules, performing web traffic analysis to block threats and mitigate attacks against applications.
  • Monitor and administer EDR solutions (e.g., CrowdStrike, Microsoft Defender).
  • Perform Vulnerability Management.
  • Intermediate proficiency with operating systems (Windows and Linux) and fundamentals of endpoint and server security.
  • Proficient in analysis of events and audit logs on Windows and Linux operating systems.
  • Familiarity with ITSM (opening, managing and tracking tickets, SLAs and support workflows).
  • Ability to produce technical and executive reports, focusing on metrics and risks.
  • Actively participate in meetings with the client’s internal teams and lead the portions related to cybersecurity deliverables.
  • Prepare and deliver reports and presentations for the client’s senior management, translating events and threats into business impact.
  • Collaborate with IT and engineering teams to develop and implement security solutions.
  • Stay up to date on the latest trends in cybersecurity and emerging threats.
  • Contribute to the definition of security requirements for new projects and systems.
  • Gather and analyze new requests from the client and escalate to the commercial team when applicable.
  • Differentiators: analytical profile, good communication, organization and results-oriented.

Requirements

  • Education: Currently pursuing a degree in Information Security, Computer Science, or a related field.
  • Intermediate knowledge of Microsoft 365 (Sentinel (SIEM), Intune, Azure AD/Entra ID, Exchange and Microsoft 365 security).
  • Experience with WAF (Web Application Firewall) and web traffic analysis.
  • Experience with EDR (e.g., CrowdStrike, Microsoft Defender) for detection and incident response.
  • Advanced training/courses in information security.
  • Language level: Intermediate English.
  • Knowledge of applying vulnerability remediations and guiding responsible teams.
  • Preferred certifications: Microsoft Certified: Security Operations Analyst Associate (SC-200) and CrowdStrike Certified Falcon Administrator (CCFA).
Benefits
  • Breakfast provided (bread and fruit)
  • Hybrid work model
  • Salary advance
  • Health insurance
  • Dental insurance
  • Life insurance
  • Childcare assistance
  • Food allowance
  • Meal allowance
  • Profit-sharing (PLR)
  • Transportation allowance
  • Payroll-deductible loan
  • Partnerships with English schools, colleges, pet assistance and other perks

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
Microsoft SentinelAzure ADIntuneWAFEDRWindowsLinuxvulnerability managementevent analysisaudit logs
Soft skills
communicationorganizationanalyticalresults-orientedcollaborationreportingpresentationclient interactionleadershipproblem-solving
Certifications
Microsoft Certified: Security Operations Analyst Associate (SC-200)CrowdStrike Certified Falcon Administrator (CCFA)