- - - - - - - - - - - -
KEY EXPECTED ACHIEVEMENTS
• The basic threats, risks and security vulnerabilities of the company's IT and digital solutions are known and evaluated.
• Contribute to technical watch to anticipate the evolution of the risks.
• The safety requirements and their implementation are a good compromise between the costs, the acceptance by the users and the level of residual risk.
• The tools and methods needed to ensure the security of IT and digital projects and solutions are implemented to control the level of risk.
• Security incidents are resolved.
• His/Her actions contribute to improving the behavior of people (users of IT and digital solutions, managers, professionals of IT and digital solutions) facing constantly changing security risks and threats.
Primary Skills (Technical Must Haves)
Strong knowledge of EPP/EDR/XDR: EPP - TrendMicro, EDRDesign, implement, and manage endpoint security solutions, including antivirus software, firewalls, and intrusion detection/prevention systems.Ensure comprehensive endpoint coverage and centralized management setup.Configure endpoint protection settings according to organizational requirements.Install and deploy Trend Micro Solution across various environments.Manage (health and availability), update/upgrade of the Security SolutionAgent management, Monitoring, Upgrade agents versions, debug, repairManaging access, groups, roles, assets groups, security policies and security profiles, Firewall policies/rules, Rules Updates (Content signature updates…) & Create/Manage Patterns rules (IOC, BIOC...)Analysis and processing critical security alerts and incidents (Malware, Intrusion, Exploitation, Exfiltration, etc.), Blacklisting / Whitelisting files, Asset IsolationMonitor EPP/EDR systems to detect and respond to security incidentsKPIs - Provide overview for solution Operation for Build and Run phases (Socle Components/Agents/Incidents)Proficiency in Windows Server, Linux, or Unix operating systems.Monitor compliance actions for Windows/Linux systems for security topicsDetect abnormal behavior in the operational environment for security topicsQualify the incidents relating to these anomaliesMonitor compliance actionsSupport end-to-end security solutions (Implementation and provide technical support in BAU mode)Write documentation for support analyst and/or end usersTrain or educate end users) when needed.Capitalize, to make each operation smoother than the previous oneSecurity: Antivirus, Intrusion Detection, Encryption.Documentation: Systems, Processes, Procedures.Secondary Skills (Technical Good to Have)
Advanced troubleshooting skills.Experience in enterprise-level infrastructure management.ITIL or other IT service management frameworks.Scripting languages: PowerShell, Python, Bash.Automation tools and techniques is a real plus.Soft Skills required
Strong communication skills.Listens to constructive feedback and incorporates suggestions to achieve collective objectivesExcellent written, verbal, and interpersonal skillsSelf-motivated and be able to produce and perform with minimal supervision as wellCuriosityRigor, well organizedAbility to take decisionsAbility to collaborate in cross-functional teamsPrioritization and time management.Adaptability in a fast-paced environment