Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Responsibilities
- Analyze and investigate alerts escalated by the SOC: triage, validation, and classification of incidents; determine impact and scope.
- Correlate events and perform investigations using platforms such as Microsoft Security, EDR/XDR (e.g., CrowdStrike), and network/endpoint logs.
- Support incident response activities: evidence collection, data preservation, and basic forensic analysis (memory, logs, traffic).
- Assist in the tuning and maintenance of detection rules in SIEM, EDR, and IDS/IPS; propose improvements to reduce false positives.
- Collaborate on the development and update of incident response playbooks; implement simple automations.
- Produce technical investigation reports and status dashboards; prepare communications for stakeholders when required.
- Participate in post-incident reviews, identifying root causes, mitigation measures, and lessons learned.
- Work closely with OT/IT teams to ensure that security measures are suitable for industrial environments (network segmentation, IoT/OT asset control).
- Contribute to the continuous strengthening of the SOC (documentation, detection testing, simulation exercises).
- Bachelor’s degree in Cybersecurity, Computer Engineering, Networks, or equivalent areas; or relevant hands-on experience in SOC/security engineering.
- Proven experience (1–3 years) in Cyber Security teams, preferably in incident response, security monitoring, or security engineering.
- Knowledge of vulnerability management and patching processes.
- Familiarity with EDR/XDR tools (e.g., CrowdStrike), SIEM solutions (e.g., Microsoft Sentinel), and detection frameworks (MITRE ATT&CK).
- Solid understanding of networks, protocols, and log analysis.
- Basic scripting skills (Python, PowerShell, Bash) for task automation.
- Experience with rule tuning and integration of security solutions.
- Experience with cloud environments (Azure, AWS) – valued.
- Proficiency in Portuguese and English (spoken and written) is essential for technical communication and collaboration with global teams.
- Valued certifications: CompTIA Security+, CySA+, GCIH, GCIA, Azure Security Engineer (not mandatory).
- Experience in industrial environments (OT/IoT) or with MSSPs – valued.
- Analytical, communicative, and proactive profile, with the ability to work under pressure and as part of a team.
Key Skills
Ranked by relevanceReady to apply?
Join SONAE ARAUCO and take your career to the next level!
Application takes less than 5 minutes

