Senior SOC Analyst

Latin America-Brazil-São Paulo-São Paulo

Kenvue

Everyday care is a powerful catalyst in making you feel better, inside and out. Learn about the iconic brands, products, people, and history that make up Kenvue.

View all jobs at Kenvue

Apply now Apply later

Senior SOC Analyst-2407025320W

Description

 

Kenvue is currently recruiting for:

Senior SOC Analyst

This is a hybrid position for out Sao Pauulo office and it reports to SOC Incident Manager.

Who we are

At Kenvue, we realize the extraordinary power of everyday care. Built on over a century of heritage and rooted in science, we’re the house of iconic brands - including Neutrogena, Aveeno, Tylenol, Listerine, Johnson’s and BAND-AID® Brand Adhesive Bandages that you already know and love. Science is our passion; care is our talent. Our global team is made up of ~ 22,000 diverse and brilliant people, passionate about insights, innovation and committed to delivering the best products to our customers. With expertise and empathy, being a Kenvuer means having the power to impact the life of millions of people every day. We put people first, care fiercely, earn trust with science and solve with courage – and have brilliant opportunities waiting for you! Join us in shaping our future–and yours. For more information, click here.

 

What you will do 

We are currently seeking a highly skilled and experienced SOC Level 3 Analyst with strong analytical abilities and extensive experience in incident management. The ideal candidate will play a crucial role in handling complex security incidents, supporting junior analysts with their knowledge and expertise, and actively contributing to the overall security posture of the organization.

 

Key Responsibilities

·       Handle complex security incidents, performing deep-dive analysis and investigation to determine the root cause and impact.

·       Provide advanced support and guidance to Level 1 and Level 2 analysts, helping them with complex incidents and escalations.

·       Develop and refine incident response procedures and playbooks to enhance the efficiency and effectiveness of the SOC.

·       Conduct threat hunting activities to proactively identify and mitigate potential security risks and vulnerabilities within the organization.

·       Monitor and analyze security event data from various sources, including SIEM, IDS/IPS, firewalls, and other security tools.

·       Collaborate with other teams to ensure comprehensive threat intelligence sharing and coordinated incident response efforts.

·       Stay current with the latest security trends, attack techniques, and threat landscapes to inform and improve SOC operations.

·       Participate in the development and implementation of security policies and procedures, ensuring they are effectively communicated and adhered to.

·       Provide detailed reports and documentation of incidents, including lessons learned and recommendations for improvement.

·       Assist the SOC Manager with strategic security projects and initiatives, contributing your expertise to enhance the overall security posture of the organization.

Qualifications

 

What we are looking for

Required Qualifications

·       Bachelor's degree in Computer Science, Information Systems, or related field or equivalent by track-record of successful enterprise experience.

·       Minimum of 5 years of experience in SOC operations, incident response, and security management.

·       Strong knowledge of security technologies such as SIEM, IDS/IPS, and firewalls, XDR.

·       Experience with SOC technology and tools (SIEM/SOAR, Detection Engineering, XDR/EDR)

·       Incident Response and Management:

o    Extensive experience in handling and managing complex security incidents.

o    Proficiency in executing incident response procedures, including identification, containment, eradication, recovery, and lessons learned.

·       Threat Hunting and Analysis:

o    Strong skills in proactive threat hunting to identify potential security threats and vulnerabilities.

o    Ability to analyze and interpret data from various security tools and sources to detect suspicious activities.

·       Security Monitoring and Tools:

o    Deep understanding of security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and other monitoring tools.

o    Experience with endpoint detection and response (EDR) solutions.

·       Network and System Security:

o    Strong understanding of network protocols, architectures, and security technologies.

o    Knowledge of operating systems (Windows, Linux, Unix) and their security features.

 

Desired Qualifications

·       Malware Analysis and Reverse Engineering:

o    Proficiency in analyzing malware to understand its behavior and impact.

o    Capability to reverse engineer malicious code to develop detection and mitigation strategies.

·       Forensics and Investigation:

o    Expertise in digital forensics and the ability to conduct thorough investigations.

o    Familiarity with forensic tools and techniques for evidence collection and analysis.

·       Vulnerability Assessment and Penetration Testing:

o    Ability to conduct vulnerability assessments and penetration testing to identify and mitigate security weaknesses.

o    Knowledge of common vulnerabilities and exploitation techniques.

·       Regulatory Compliance and Standards:

o    Understanding of relevant regulations and standards (e.g., GDPR, HIPAA, PCI-DSS, NIST).

o    Ability to ensure that security practices comply with these regulations and standards.

·       Communication and Collaboration:

o    Strong verbal and written communication skills to effectively convey technical information to both technical and non-technical stakeholders.

o    Ability to work collaboratively with cross-functional teams, including IT, legal, and compliance.

·       Continuous Learning and Adaptability:

o    Commitment to staying updated with the latest security trends, threats, and technologies.

o    Adaptability to evolving security challenges and willingness to continuously improve skills and knowledge.

·       Certifications (preferred but not mandatory):

o   Relevant certifications such as CISSP, CISM, CEH, GCIA, GCIH, or other industry-recognized credentials.

 

What’s in it for you

·    Annual base salary for new hires in this position ranges takes into account a number of factors including work location, the candidate’s skills, experience, education level & other job-related factors.

·    Competitive Total Rewards Package*

·    Paid Company Holidays, Paid Vacation, Volunteer Time & More!

·    Learning & Development Opportunities

·    Employee Resource Groups 

·    This list could vary based on location/region

*Note: Total Rewards at Kenvue include salary, bonus (if applicable) and benefits. Your Talent Access Partner will be able to share more about our total rewards offerings and the specific salary range for the relevant location(s) during the recruitment & hiring process.

 

Primary Location

 Latin America-Brazil-São Paulo-São Paulo

Job Function

 Information Security
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: CEH CISM CISSP Compliance Computer Science EDR Firewalls Forensics GCIA GCIH GDPR HIPAA IDS Incident response Intrusion detection IPS Linux Malware Monitoring NIST Pentesting Reverse engineering SIEM SOAR SOC Threat intelligence UNIX Vulnerabilities Windows XDR

Perks/benefits: Career development Competitive pay Salary bonus

Regions: North America South America
Country: Brazil

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.