Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Job Overview
We are seeking an early-to-mid career Cybersecurity Analyst with a primary focus on incident response, IOC triage, and threat hunting. This role is critical to monitoring, analyzing, and responding to security alerts across our enterprise systems, including endpoints, firewalls, privileged access, and email security platforms. The ideal candidate will bring hands-on experience with tools such as CyberArk PAM, Palo Alto Cortex XDR, Abnormal AI, and Microsoft Defender (MDE, MDI, MDA), as well as experience using SIEM technologies.
Key Responsibilities
• Incident Response & IOC Triage: Triage and respond to alerts from Palo Alto Cortex XDR, Microsoft Defender (MDE, MDI, MDA), Abnormal AI, and other platforms. Validate IOCs, follow playbooks, escalate issues, and coordinate remediation efforts.
• Threat Hunting: Proactively hunt for malicious activity and patterns of compromise across endpoints, privileged accounts, and email systems.
• Privileged Access Management: Use and manage CyberArk PAM to safeguard critical systems and investigate suspicious privileged account activity. This includes providing secure remote access to partners.
• Phishing & Email Security: Analyze reported phishing attempts, manage security measures, and support awareness campaigns to reduce phishing risks.
• SIEM Monitoring: Use SIEM technologies to query and correlate logs, enrich investigations, and support incident containment and eradication.
• Collaboration: Work closely with IT, Security, Legal, and business teams to respond to threats and support a strong security posture.
• Optional/Secondary: Support compliance team with vendor cyber risk findings remediations (Panorays) as needed.
Qualifications
• Advanced english level is required.
• Bachelor’s degree in Computer Science, Cybersecurity, or equivalent experience.
• 3+ years of experience in cybersecurity, with direct exposure to incident response, IOC triage, and security monitoring.
• Hands-on experience with CyberArk PAM, Palo Alto Cortex XDR, Microsoft Defender suite, and email security platforms such as Abnormal AI.
• Proficiency in identifying, managing, and mitigating cyber threats across multiple vectors.
• Strong analytical skills with the ability to evaluate and prioritize incident response activities.
• Excellent communication skills and ability to collaborate across teams.
Preferred Experience
• Experience in advanced incident response and handling complex security events.
• Relevant certifications such as CISSP, CEH, CySA+, or vendor-specific certifications (CyberArk, Palo Alto, Microsoft).
• Familiarity with regulatory requirements and industry standards (ISO 27001, NIST CSF, DFARS/CMMC).
Al postularte o avanzar en este proceso, aceptas el tratamiento de tus datos personales conforme a nuestra Política de Privacidad, en cumplimiento de la Ley 25.326. ManpowerGroup Argentina tratará tu información exclusivamente con fines de evaluación y contacto en relación con oportunidades laborales. Podés ejercer tus derechos de acceso, rectificación o supresión cuando lo desees.
Key Skills
Ranked by relevanceReady to apply?
Join Experis Argentina and take your career to the next level!
Application takes less than 5 minutes

