Expoint – all jobs in one place
Finding the best job has never been easier
Limitless High-tech career opportunities - Expoint

Dell Cybersecurity Incident Response Analyst L3 
Mexico, Mexico City 
802194544

Yesterday

What you’ll achieve

As a Cyber Incident Response Analyst L3, this role is responsible for investigating and reporting of security incidents supporting all Dell Business Units. This role requires experience in all phases of Cybersecurity incident response including preparation, analysis, notification, response, recovery, and post-mortem activities. This role interacts with all levels of the organization and is viewed as a subject matter expert on all Incident Response activities.

You will:

  • Serve as a global escalation point and work with the Incident Response Team members on tickets to manage / prioritize queue assignments

  • Perform technical cyber security investigations on security incidents, root cause analysis, recommend and mitigate the effects caused by an incident

  • Participate in After Actions Reports creation based on Lessons Learned from critical cybersecurity incidents

  • Investigate/analyze large and unstructured data sets, malicious artifacts, and EDR tools to identify trends and anomalies indicative of potential threats

  • Liaison with stakeholders and internal CSIRT teams to serve as a Cyber Security Champion to help implement best security practices and mature the Security Incident Response process to meet the needs of the business.

Essential Requirements
  • 8+ years of overall related experience with 5+ years of cybersecurity Incident Response experience and 1+ years of hands-on experience in a Security Operations Center

  • Exceptional ability to conduct cybersecurity investigations, analyze and distill relevant findings and determine root cause

  • Strong knowledge of security and web technologies such as SIEM, full packet capture, Firewall/NGFW, IDS/IPS, EDR, DLP, UEBA, networking protocols, Microsoft Windows and Linux/Unix platforms and tools with related experience in corporate infrastructures

  • Strong technical experience and familiarity of various types and techniques of cyber-attacks, with the incident response and threat hunting lifecycles

  • Excellent analytical thinking, time management and coordination skills and excellent command in English (both written and verbal)

Desirable Requirements

  • Industry recognized certification (CISSP, SANS GCIH, GCIA, GNFA, GREM, etc.)

  • Knowledge and experience in: Digital Forensics, reverse malware tools, and scripting languages

Application closing date: