




Position Summary: We are seeking a Cybersecurity Analyst to provide technical support for an industrial multinational, managing incidents, documentation, and monitoring security infrastructure. Key Highlights: 1. Incident resolution and customer request management 2. Infrastructure monitoring and implementation of security changes 3. Design and execution of hardening on perimeter security devices DESCRIPTION **We are looking for a Cybersecurity Analyst** *20 km from Barcelona | Hybrid work model* *Working hours: 9:00 AM to 6:00 PM* *Permanent contract* **SIRT**, a company with over 28 years of experience in the telecommunications sector and national and international presence, is incorporating a **Cybersecurity Analyst** to support the technical security office of an industrial multinational. **Your main responsibilities** * Incident resolution and customer request management. * Generation of operational documentation. * Development of processes for resolving security incidents. * Monitoring of security infrastructure. * Implementation of configuration changes. * Execution of quality audits. * Design and execution of *hardening* on perimeter security devices. **Would you like to join our team?** If you believe your profile matches this position and you want to take the next step in your cybersecurity career, Send us your application and let’s talk. We’re looking forward to meeting you! REQUIREMENTS **Key profile requirements** *Highly valued*: experience with Proofpoint, SentinelOne (EDR), and prior SOC experience. 1⃣ Communication networks Knowledge equivalent to Cisco CCNP: switching, wireless, routing. 2⃣ Perimeter security Understanding of solutions such as: EDR, IPS, NGFW, antiDDoS, web and email filtering. 3⃣ Vendor experience Experience with leading solutions including: Cisco, Fortinet, Check Point, CrowdStrike, Proofpoint, SentinelOne, among others. 4⃣ Technical security office Customer orientation and strong communication skills. 5⃣ Security operational processes Experience in the following areas is valued: SOC, incident handling, threat hunting, threat intelligence, and procedure development.


