DohaAtos SE (Societas Europaea) is a leader in digital services with pro forma annual revenue of circa € 12 billion and circa 100,000 employees in 72 countries.
Serving a global client base, the Group provides Consulting & Systems Integration services, Managed Services & BPO, Cloud operations, Big Data & Cyber-security solutions, as well as transactional services through Worldline, the European leader in the payments and transactional services industry.
With its deep technology expertise and industry knowledge, the Group works with clients across different business sectors : Defense, Financial Services, Health, Manufacturing, Media, Utilities, Public sector, Retail, Telecommunications, and Transportation.
Atos is focused on business technology that powers progress and helps organizations to create their firm of the future. The Group is the Worldwide Information Technology Partner for the Olympic & Paralympic Games and is listed on the Euronext Paris market.
Atos operates under the brands Atos, Atos Consulting, Atos Worldgrid, Bull, Canopy, Unify and Worldline.Job Description : SOC Forensic InvestigatorForensic Investigation and handling is the key responsibility.
Profile RequirementsProposition of specific recommendationsForensic Investigation and handling.Creating and maintaining an incident response plan (IRP)Investigating and analyzing incidentsManaging internal communications and updates during or immediately after incidentsCommunicating with employees, shareholders, customers, and the press about incidents as neededRemediating incidents working with right stakeholders.
Recommending technology, policy, governance, and training changes after security incidentsInvestigate and solves security breaches and other cyber security incidents and provide incident response.
Incident analysis for correlation rules design and implementationBusiness use-cases design and deploymentCheck of applied recommendation for L3 incidentsValidates weekly, monthly, quarterly, half and yearly reportsDefinition and follow up of incident reconstruction plansMalware analysis, reverse engineeringD eals with incidents from L2 and investigation and qualification of L2 incidentsAccess to tiers tools for investigationDevelopment, fine-tuning, and implementation of threat detection analyticsProvides investigation on complex incidentsProvides forensics investigation and analysis ( memory, filesystem, network, mobile iOS / Android forensics,Analyze and provides threat intelligence informationProvides advisories on incident modelling and reconstructionDefine new correlation rules in the SIEM depens on the requirementsProvides security crisis managementVery good communication skills with fluent EnglishDeep log analysis skills on SIEM - Logrhythm, Logrhythm experience and knowhow will be plus.
Very good knowledge of Windows and / or Linux / Unix,Very good understanding of security incidents, networking and common protocols,Scripting in Python, Bash, Perl, PowerShell.
Review standard security arrangements that is, provide external / semi-external reviewsManage audits and training for new threatsStay current on IT security trends and news.
Analyze for attacks, intrusions and unusual, unauthorized or illegal activityInvestigate new vulnerabilities and share the latest industry-level responsesInvestigate security breaches and other cyber security incidents and provide incident response.
Liaise with different internal and external stakeholders when an incident occursManage remotely stored critical information (passwords, network configs, etc.
in an emergencyUse advanced analytic tools to determine emerging threat patterns and vulnerabilitiesliaise with stakeholders in relation to cyber security issues and provide future recommendationsInstall security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
Document security breaches and assess the damage they cause.Work with security team to perform tests and uncover network vulnerabilities.
Fix detected vulnerabilities to maintain a high-security standard.Stay current on IT security trends and news.Research security enhancements and make recommendations to management.
Min 3 years of SOC Level 2 and Min 2 years of SOC Level 3 experience.Mandatory Skills : Experience is SIEM tool Analysis and Administration , Incident management, Forensic Investigation, Communications skills.
Mandatory certifications Any SIEM Analyst and Administration, Any Forensic certification, ITIL.Your ApplicationIf you wish to apply for this position, please click below to complete our online application form and attach your CV in either Word, rtf or text format.
Atos does not discriminate on the basis of race, religion, colour, sex, age, disability or sexual orientation. All recruitment decisions are based solely on qualifications, skills, knowledge and experience and relevant business requirements.
We are committed to making reasonable adjustments to the applications process for people with disabilities.