You will work closely with various teams to identify, assess, and mitigate risks associated with data breaches or unauthorized access. Your role will involve implementing DLP solutions, analyzing security events, and developing strategies to enhance data protection measures.
**Key responsibilities**:
Monitor and analyze security alerts and events related to data loss prevention systems.
Investigate and respond to incidents of data loss, leakage, or unauthorized access.
Collaborate with cross-functional teams to assess the impact of security incidents and determine appropriate response actions.
Implement and maintain DLP technologies, policies, and procedures to prevent data breaches.
Conduct regular assessments and audits to identify vulnerabilities and gaps in DLP controls.
Develop and maintain incident response plans and procedures for DLP incidents.
Provide guidance and support to internal stakeholders on DLP best practices and security awareness.
Document and report on incident response activities, including root cause analysis and remediation efforts.
Stay up-to-date with the latest security threats, trends, and technologies in the field of data loss prevention.
Participate in security awareness training and exercises to enhance organizational preparedness for DLP incidents.
**Qualifications**:
Bachelor's degree in computer science, Information Security, or a related field.
Proven experience 3 years working in a security operations center (SOC) or incident response team.
In-depth knowledge of data loss prevention technologies, including DLP tools and techniques.
Familiarity with industry standards and regulations related to data protection (e.g., GDPR, HIPAA, PCI DSS).
Strong understanding of networking protocols, encryption methods, and security principles.
Proficiency in incident response methodologies, including triage, analysis, and containment.
Excellent analytical and problem-solving skills, with the ability to prioritize and manage multiple tasks under pressure.
Effective communication skills, both verbal and written, with the ability to convey technical information to non-technical audiences.
Certifications such as Certified Information Systems Security Professional (CISSP), Certified Incident Handler (GCIH), or Certified Information Security Manager (CISM) are preferred.
Experience with SIEM (Security Information and Event Management) tools and log analysis is a plus.
**Working Conditions**: This position will require occasional on-call duty and availability outside of regular business hours. Work in a fast-paced environment with tight deadlines and evolving security threats. Collaboration with internal teams and external stakeholders may be necessary.
**Requisitos**:
- Experience in the requirements
- Excellent internet connection
- Intermediate/advanced English