Bucharest, RO
11 days ago
Security Analyst

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, enterprise, and government environments, Bitdefender is one of the industry’s most trusted experts for eliminating threats, protecting privacy, digital identity and data, and enabling cyber resilience. With deep investments in research and development, Bitdefender Labs discovers hundreds of new threats each minute and validates billions of threat queries daily. The company has pioneered breakthrough innovations in antimalware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 180 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170+ countries with offices around the world. For more information, visit https://www.bitdefender.com

Our mission at Bitdefender is to reduce risk to customers’ business to allow them to achieve their objectives. We are focused on delivering real security value for an affordable price – no snake oil. To help in this mission, we are looking for a Security Analyst. You will work in a tight knit, experienced team backed up by an international organization that’s been in business for 18 years. 

About Us:
The Managed Detection & Response service is a new line of business (think division, business unit, etc). We are an experienced team having built successful Managed Security offerings in the past and staffed by a multitude of cybersecurity organizations and veteran cyber-warfare operators from the military and intelligence services. We all got into this business to provide security services that make customers safer. We must make some money to do that, but our primary goal is to provide services that secure, not just ones that sell. 
Our team has been around the block together and operate in a 24x7 environment where we manage emergency situations for customers. For this to work, we must trust each other. As a leadership team, we focus on building that trust through accountability, processes and personal relationships. We have plenty of experienced team members with and without families and understand that not all teams can be built outside of work, but we focus on teamwork to build authentic and meaningful engagement. 
 
About the Role:
This is a full-time position in a 24/7 operation with a 12-hour shift Panama schedule. Scheduled rotations for night and weekend shifts will be required.  
Under limited supervision, the Security Analyst performs real-time monitoring and analysis of security events from multiple sources. 
Triage security events to determine priority and severity 
Use indicators of compromise from current intelligence information to proactively review customers environments searching for suspicious behavior across network, host and logs data. 
Assist in the development of analytic signatures to identify suspicious and malicious behaviors  

About you:   
Be able to demonstrate understanding of the following:  
Cybersecurity principles 
Cyber threats and vulnerabilities 
Current incident response methodologies 
Current cyber investigative techniques 
Current cyber threat trends 
Computer networking concepts and protocols, and network security methodologies 
Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, NICs, HDDs) 
Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security 
Basic system administration, network, and operating system hardening techniques 
Identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files) 
Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings) 
Defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness) 
Virtualization and cloud computing 
Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files 
Hacking methodologies  
Networking protocols (e.g., TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications 
Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA]) and how they are used 
How to perform packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump) 
Security Information and Event Management (SIEM) tools - Searching, aggregating, and correlating data 
Web Application Firewall (WAF) 
Regular Expressions (Regex) 

Technical Skills: 
Basic understanding of networking concepts (TCP/IP, DNS, HTTP, etc.). 
Familiarity with operating systems (Windows, Linux, MacOS). 
Knowledge of security fundamentals (encryption, authentication, access control, etc.). 
Basic knowledge of security tools and technologies (SIEM, IDS/IPS, firewalls, antivirus software). 

Analytical Skills: 
Ability to analyze logs, network data, and other sources of information to identify potential security incidents. 
Strong problem-solving skills and attention to detail. 

Communication Skills: 
Effective written and verbal communication skills. 
Ability to document incidents and communicate technical information to non-technical stakeholders. 

Soft Skills: 
Ability to work well under pressure and handle multiple tasks simultaneously. 
Strong sense of ethics and integrity. 
Willingness to continuously learn and adapt to new threats and technologies. 

Certifications:
Entry-Level Certifications (optional but beneficial): 
CompTIA Security+ 
Certified Ethical Hacker (CEH) 
GIAC Security Essentials (GSEC) 
Cisco Certified CyberOps Associate 
Certified Information Systems Security Professional (CISSP) (for those seeking more advanced roles) 
 
Work Experience: 
Typically, 2-5+ years of experience in cybersecurity or a related field. 
Proven track record in managing advanced security incidents and performing threat analysis. 
Hands-On Experience: 
Practical experience with security tools and technologies through labs, simulations, or personal projects. 
Experience in security monitoring, incident response, and threat hunting. 
Hands-on experience with security tools and technologies such as SIEM, IDS/IPS, firewalls, EDR, and investigation tools. 

Additional Requirements:
Willingness to Work Shifts: 
Ability to work in a 24/7 environment, including night shifts, weekends, and holidays, if required. 
Continuous Learning.
Commitment to ongoing professional development and staying current with the latest cybersecurity trends and threats. 

 


Confirm your E-mail: Send Email