.The Security Operations Analyst is responsible for monitoring and protecting the organization's IT infrastructure from security threats and vulnerabilities, ensuring robust defenses against potential cyber-attacks.Main Goals:Ensure continuous monitoring and analysis of security alerts and logs.Maintain the integrity and security of the organization's IT infrastructure.Proactively identify and remediate security vulnerabilities.Responsibilities and Authorisation:Monitor and analyze security alerts, logs, and reports to detect potential security incidents.Conduct regular vulnerability assessments and penetration tests.Manage identity and access management (IAM) systems.Collaborate with IT and development teams to prioritize and remediate identified vulnerabilities.Respond to security incidents, conduct investigations, and implement corrective actions.Stay up to date with the latest security trends, threats, and technologies.Main Tasks:- Threat Detection and Response:- Monitor security alerts and logs to identify potential security incidents.- Investigate and respond to security incidents promptly.- Conduct root cause analysis and implement preventive measures.- Vulnerability Management:- Regularly conduct vulnerability assessments and penetration testing to identify security weaknesses.- Work with IT and development teams to prioritize and remediate vulnerabilities.- Track and document vulnerabilities and their remediation status.- Infrastructure Security Management:- Manage identity and access management (IAM) systems to control user access to sensitive information and systems.- Implement and maintain security controls for servers, networks, and endpoints.- Ensure secure configuration and management of firewalls, routers, and other network devices.- Security Operations:- Conduct security audits.- Respond to security-related tickets raised by employees.- Maintain KPIs related to Security Operations.Necessary experience & qualifications:2 to 3 years of demonstrable professional experience in the role.A Bachelor's Degree in Computer Science, Information Technology Cybersecurity, or a related field is required.Fluent in English, written and spoken.It will be highly valued:A Master's Degree in Cybersecurity, Information Systems, or a related field.Deep knowledge of ISO27001, GDPR, NIST, and MITRE Framework.Any of the following certifications: CEH, CISM, CompTIA, OSCP, CISA, and CISM.Benefits and Perks:Breakfast, high-quality daily lunch at a very low cost, fruit, and snacks all day long.Every Thursday you will have a free lunch with your colleagues.Gym and game room at your disposal.Working in a hyper-growth environment, you will enjoy numerous learning and career development opportunities.A professional working environment with motivated Engineers coming from all different horizons and countries with a common passion for telecommunications.Private health insurance