




Job Summary: Responsible for implementing and supporting technological solutions, monitoring capacity and availability, identifying and assessing threats, and implementing effective protective measures. Key Highlights: 1. Protect and accelerate businesses through technology 2. Be part of a crew that values collaboration and transparency 3. Contribute to the growth of crew members and the organization Nice to meet you—we are Tripla. A Brazilian technology company that protects and accelerates businesses—this is our purpose. We operate nationwide with specialized solutions in infrastructure, cybersecurity, business continuity, and governance & compliance. We work to remove the technological barriers that hinder sustainable business growth. With our solutions, we help maintain operations that are available, protected, and compliant—enabling you to save resources and dedicate more time to your business strategy. Having served over 500 organizations and partnered with leading market players, we co-create a more efficient, resilient, and scalable future for our clients. And what sets us apart? We believe extraordinary people deliver extraordinary results. Here, every Crew Member is an essential part of our journey! Being part of this crew means participating in and contributing to the growth of all crew members and the organization, being collaborative, transparent, and authentic. **Job Description** Responsible for implementing and supporting technological solutions in our operations and those of our customers, monitoring their capacity and availability, identifying and assessing threats and detected vulnerability events, implementing effective protective solutions and measures, while adhering to organizational standards, policies, ethical guidelines, and applicable legislation. **Responsibilities:** * Respond to events, alerts, and platform notifications; * Monitor dashboards and monitoring systems; * Report incidents and anomalies according to defined procedures; * Open and track service tickets; * Handle tickets in the IT Service Management (ITSM) system; * Register tickets in the ITSM system and with vendors; * Assist in collecting basic information for analysis; * Perform routine tasks; * Carry out maintenance and support tasks; * Validate environment capacity; * Prepare status reports; * Detect and respond to incidents; * Investigate suspicious alerts and events; * Execute containment actions per established procedures; * Administer systems and infrastructure; * Install, configure, and update security components; * Manage user accounts and access controls; * Prepare monthly executive reports; * Consolidate monitoring, performance, and request metric data; * Present traffic vs. security and resource savings analyses; * Participate in technical meetings; * Discuss tool adjustments and optimizations. **Education:** * Bachelor’s degree in Information Technology, Information Security, or related fields. **Technical Competencies:** * NIST; * COBIT (Desirable); * ITIL (Desirable); * ISO 27001; * OWASP; * Process Management; * Configuration Management; * Change Management; * Capacity Management; * Event Management; * Access Management; * Risk Management (Desirable); * Disaster Recovery Planning (DRP) (Desirable); * Business Continuity (Desirable); * Process Design (Desirable); * Training and Awareness (Desirable); * Security Solutions and Tools; * SIEM (log management) (Desirable); * Firewall; * WAF; * IDS/IPS; * XDR; * AntiMalware; * ZTNA (Desirable); * VPN; * PAM (password vault); * DNS; * DHCP; * Business Continuity (Desirable); * Process Design (Desirable); * Training and Awareness (Desirable); * Security Solutions and Tools; * SIEM (log management) (Desirable); * Firewall; * WAF; * IDS/IPS; * XDR; * AntiMalware; * ZTNA (Desirable); * VPN; * PAM (password vault); * DNS; * DHCP; * Operating Systems and Platforms; * Microsoft Active Directory; * Microsoft Office / Office 365; * Linux; * Windows; * macOS (Desirable); * Cloud Computing (Desirable); * Computer Networks (LAN/WAN); * Advanced Technical Skills; * Development for automation and integration of solutions; * Identification of threats detected by systems; * Investigation of suspicious activities; * Threat elimination and risk mitigation; * API integration (e.g., querying Cloudflare or VirusTotal APIs); * Implementation of privacy and information security policies and guidelines; * Documentation, report generation, and performance indicators. **Other Requirements:** * ISO 27001 Foundation * ITIL Foundation * An “Intermediate” vendor certification (e.g., Trend, Sophos, Cloudflare, Fortinet, etc.); **Desirable:** * CompTIA Security+ * CompTIA CySA+ (Cybersecurity Analyst)


