
SecOps Analyst
Insight Value
full-time
Posted on:
Location Type: Remote
Location: Remote • 🇧🇷 Brazil
Visit company websiteJob Level
Mid-LevelSenior
Tech Stack
FirewallsSplunk
About the role
- Develop, maintain, and evolve automation playbooks and detection rules in a SOAR environment (e.g., Splunk SOAR, Cortex XSOAR).
- Automate security incident responses by integrating various APIs, webhooks, and monitoring systems.
- Monitor log ingestion flows and log quality, ensuring consistency and reliability of information.
- Perform integrations with security tools (Firewalls, IPS, WAF, Anti-DDoS, among others).
- Work closely with the Managed Security Services (MSS) team to optimize routines and response processes.
Requirements
- Strong experience in Information Security and Network Architecture.
- Experience with orchestration and automation of playbooks.
- Experience managing and ingesting logs from systems, networks, and security tools.
- Knowledge of security standards, frameworks, and best practices.
- Familiarity with Managed Security Services (MSS) routines and processes.
- Preferred: Experience with complex security automation projects.
- Experience integrating multiple security tools.
- Relevant certifications (GCIA, GCFA, Security+, CySA+, Splunk Core Certified, etc.).
- Participation in internal continuous improvement and automation projects.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
automation playbooksdetection rulesAPI integrationlog ingestionsecurity incident responsenetwork architectureorchestrationsecurity tool integrationmonitoring systemssecurity automation
Soft skills
collaborationoptimizationcontinuous improvement
Certifications
GCIAGCFASecurity+CySA+Splunk Core Certified