





Description: * Degree in Information Technology, Information Security, Computer Engineering, or related fields. * Experience in SOC / Blue Team environments. * Proficiency in SIEM tools (Splunk, QRadar, Microsoft Sentinel, etc.), EDR tools (CrowdStrike, SentinelOne, Defender for Endpoint, etc.), and WAF. * Experience in incident response, threat hunting, and event analysis. * Knowledge of security frameworks and best practices: MITRE ATT&CK, NIST CSF, CIS Controls. * Technical English (reading and professional updating). * Manage SOC technical operations, ensuring continuous monitoring and effective incident response. * Refine rules and automate incident response processes in SOAR. * Conduct validation and testing of security tools, including SIEM, WAF, and EDR. * Support technical vendor evaluations and ensure implemented controls comply with security standards. * Monitor security metrics and act to improve infection management of endpoints and vulnerability mitigation. * Collaborate with Infrastructure, Governance, and Risk teams to strengthen corporate security posture. * Provide evidence and support internal and external audits (LGPD, ISO 27001, NIST, CIS, among others). 2512080202191852953


