Кариери

Специалист информационна сигурност

Ние предлагаме:

  • Конкурентно за ИТ бранша възнаграждение.
  • Отлични условия на труд.
  • Възможности за сертификация (и покриване на сертификационна такса, ако има такава) и професионално развитие.
  • Динамична, предизвикателна и интересна работа за клиенти, сред които водещи телекомуникационни компании и 10-те най-големи финансови институции.
  • Колеги, на които може да разчитате да споделят своите опит и умения.
  • Годишен бонус.
  • Модерен офис на комуникативно място в София – на 1 мин. от метростанция.
  • Процес на целеполагане, годишен преглед на постиженията и актуализиране на възнаграждението.
  • Служебен мобилен телефон.
  • Фиксирано работно време с възможност за дистанционна работа.
  • Много забавни моменти по време на редовните ни тиймбилдинг активности.

Отговорности:

  • Да извършва срещи с клиенти и предлага ИТ решения за сигурност на достъпен език.
  • Да специфицира ИТ решения, според нуждите на клиента
  • Изпълнява задачи, свързани с управление на информационната сигурност, възникването на инциденти и наблюдението на събития, свързани със сигурността.
  • Да прави предложения за оптимизация на конфигурация, с цел подобрявне на ИТ сигурността.
  • Да прави дизаин за внедряване на ИТ решения, да конфигураира ИТ продукти.
  • Да изготвя техническа документация.

Изисквания към кандидатите:

  • 2 г. опит в областта на информационните технологии.
  • Владеене на английски език на ниво B2, с възможност за свободно ползване и търсене на документация по специалността.
  • Познания за работата на мрежовите протоколи, устройства и услуги (OSI модел).
  • Познания за работа на протоколи HTTP/s, FTP, SMTP, DNS, TCP/IP.
  • Познания в областта на Linux базирани OS.
  • Познания в областта на сървърни Windows OS.
  • Умения за разчитане и анализ на конфигурационни файлове и системни логове.
  • Познания за съвременните методи за реализация на кибер атаки.
  • Аналитично мислене.
  • Инициативност и креативност.
  • Организираност и умения за работа в екип.
  • Предимство са ИТ сертификати в областта на ИТ сигурността.
  • Предимство е познаване на следните технологии и опит в конфигурирането им: IPS/IDS; NGFW, SIEM, DLP, WAF, Email Protection, Web Protection, MDM, Certification Authority.

Ако прояваявате интерес към настоящата обява, моля да изпратите своето CV на career@mnemonica.bg Всички данни, предоставени от Вас, са защитени по смисъла на ЗЗЛД и ще бъдат използвани единствено за целите на настоящия подбор.

Senior System Administrator

What we offer:

• Career development plan
• Mentor program
• Certification courses
• Internal and external trainings
• Opportunity to attend conferences, workshops as well as different sports events
• 20 days paid vacation
• Modern office near a metro station
• Mobile phone
• Team buildings and office parties

If you have:

• Degree in Computer Systems and Technologies
• At least 5years experience with Windows 2008/2012/2016 Server
• At least 5years experience with Microsoft Windows Active Directory
• Excellent knowledge of SAN/NAS storage technologies preferably EMC/HPE/IBM products.
• Expert knowledge of FC and Network cable mediums and connectivity types.
• Good knowledge of virtualization technologies – VMware/ MS Hyper-V/ Citrix
• Good knowledge of overall infrastructure technical knowledge & troubleshooting methodologies

Nice to Have:

• Experience with HPE Blade system c7000/Synergy/Simplivity infrastructure
• Excellent knowledge of Brocade/Cisco Fiber Channel switches
• Experience with Linux OS

Primary Responsibilities:

• Participate in company Integration projects (design, implementation, support)
• Prepare technical documentation;
• Analyze and compare technical and business value of the solutions;
• Active communication with customers and internal resources about on-going projects;

Personal Skills:

• Good communication skills in English (spoken & written)
• Ability and willingness to work in a team, strong analytical and communications skills
• Ability to work under pressure and meet deadlines
• Ability to align the customer requirements to the appropriate solutions
• Self-motivated, resourceful and able to show initiative
• Team oriented
• Strategic and analytical thinking
• Ability to communicate with customers and engineers with clarity and technical competence
• Organized and priority driven

Ако прояваявате интерес към настоящата обява, моля да изпратите своето CV на career@mnemonica.bg Всички данни, предоставени от Вас, са защитени по смисъла на ЗЗЛД и ще бъдат използвани единствено за целите на настоящия подбор.

Security Architect

The SOC Architect (SA) is a hands-on technologist who is an expert in the use of the technologies that comprise Mnemonica’s SIEM solutions reporting to the Manager of SOC Operations. The scope of this position is company-wide and requires an understanding of all partner facing systems the company uses and how they provide value to our partners. The SA works closely with other members of the Security Teams in ensuring that the information security posture of the company’s solutions is maintained and takes a proactive approach in continually assessing the effectiveness and efficiency of the SIEM or DLP projects and offerings.

What we offer:

• Career development plan
• Mentor program
• Certification courses
• Internal and external trainings
• Opportunity to attend conferences, workshops as well as different sports events
• 20 days paid vacation
• Modern office near a metro station
• Mobile phone
• Team buildings and office parties

Responsibilities

• Serve as the primary escalation point for SIEM/DLP platform issues
• Serve as a SME for the SIEM/DLP platform
• Develops and implements effective correlation rules
• Tunes SIEM/DLP components and policies to ensure maximum reliability and reduce false positives
• Review security context alerts and logs using the security information event management platform (SIEM) or other tools
• Promptly respond to requests for assistance from partners and others
• Escalate security events/incidents according to defined workflow and in accordance with any relevant SLAs
• Adhere to relevant policies, procedures, standards and security good/accepted practices
• Resolve problems independently and understand escalation procedure
• Respond in a timely manner to all requests for access or other security exceptions requiring approval or involvement

Qualifications
ESSENTIAL CAPABILITIES

• Ability to relate to non-technical users in user-friendly language
• Ability to understand or learn the technical implications of security threats
• Ability to manage multiple concurrent objectives or activities, and effectively make judgments in prioritizing and time allocation in a high-pressure environment
• Ability to gauge one’s strengths and limitations
• Ability to deal with changes and adapt to a changing environment
• Must demonstrate the ability to maintain strict confidentiality of the firm’s internal and personnel affairs
• Ability to work well with others, harness different skills and experience, and build a strong sense of team spirit
• Highly self-motivated and directed
• Ability to work effectively in a culturally and educationally diverse environment
• Solid knowledge of SIEM technology, technical configuration and operations of at least One vendor like McAfee, RSA or equivalent security vendors.
• Knowledge of DLP technology, technical configuration and operations of at least One vendor like McAfee, Forcepoint or equivalent security vendors.

EDUCATION, EXPERIENCE AND SKILLS REQUIRED

• Bachelor of Science in a technology related discipline or at least 2 year of relevant experience
• At least 1 year of experience in a role dedicated to the configuration, maintenance, implementation and administration of SIEM Projects or SIEM/SOC solutions.

Ако прояваявате интерес към настоящата обява, моля да изпратите своето CV на career@mnemonica.bg Всички данни, предоставени от Вас, са защитени по смисъла на ЗЗЛД и ще бъдат използвани единствено за целите на настоящия подбор.

Security Operations Center (SOC) Analyst Tier I

About the Job

We are looking for a Security Operations Center (SOC) Analyst Tier I. The Security Operations Center (SOC) Analyst position is assigned to the Security Operations Team. The primary purpose of this position is to help coordinate and report on actionable alarms, successfully identify and report false-positives. This position involves paying attention to detail.

What we offer
• Career development plan
• Mentor program
• Certification courses
• Internal and external trainings
• Opportunity to attend conferences, workshops as well as different sports events
• 20 days paid vacation
• Modern office near a metro station
• Mobile phone
• Team buildings and office parties

Mission

Responsible for monitoring computer security events according to documented procedures and industry best practices. First line of defense in protecting information systems from internal and external threats.
Available shifts are 9×5 or 24×7, day shift: 9AM-9PM; night shift 9PM-9AM
Roles & Responsibilities
• Willing to work on shifts in Security Operations Center (SOC) environment
• Monitor security events received through alerts from SIEM or other security tools
• Revise alerts escalated by end users
• Perform Tier I initial incident triage: Carry out Level 1 triage of incoming issues
• Carry out limited incident response to end users for low complexity security incidents
• Maintain assigned ticket queue
• Clearly communicate and share your analysis with members of the SOC and/or clients.
• Document all activities during an incident and providing leadership with status updates during the life cycle of the incident.
• Create a final incident report detailing the events of the incident

Requirements

• Excellent written and oral communication skills (Bulgarian/English)
• Self-motivated and able to work in an independent manner
• Work experience in IT position 2+ years, or Bachelor’s degree in an IT related field or equivalent education, or Work Experience
• Solid Understanding of TCP/IP, the OSI Model, and underlying Protocols
Preferred Qualifications / Will be considered advantage/ if you have one or more:
• Experience with Security Information and Event Management (SIEM) tools
• Experience with Network and Device Monitoring Systems, like Nagios
• Experience with Endpoint Security operations (Antivirus and/or EDR solutions)
• Experience with Vulnerability Scanning/Management tools.

Ако прояваявате интерес към настоящата обява, моля да изпратите своето CV на career@mnemonica.bg Всички данни, предоставени от Вас, са защитени по смисъла на ЗЗЛД и ще бъдат използвани единствено за целите на настоящия подбор.

Security Operations Center (SOC) Analyst Tier II/III

About the Job

We are looking for experienced Security Operations Center (SOC) Analyst Tier II/III with Incident Response capability. The Security Operations Center (SOC) Analyst position is assigned to the Security Operations Team. The primary purpose of this position is to help solve complex IT security incidents and report, successfully identify and isolate endpoint and network threats and intrusions. This position involves paying attention to detail, deep knowledge of networking protocols, malware analysis and cyber security solutions/or technologies/. Previous experience in a similar position is a must.

What we offer

• Career development plan
• Mentor program
• Certification courses
• Internal and external trainings
• Opportunity to attend conferences, workshops as well as different sports events
• 20 days paid vacation
• Modern office near a metro station
• Mobile phone
• Team buildings and office parties

Mission

Responsible for monitoring computer security events according to documented procedures and industry best practices. Second and Third TIER escalation, part of the whole SOC defense environment, with our main goal – to protect information systems from internal and external threats.
Available shifts are 9×5, normal shift: 9AM-18PM or flexible shifts.

Roles & Responsibilities

• Willing to work on shifts in Security Operations Center (SOC) environment
• Take ownership of escalated incidents from Tier I and Perform Tier II deep incident triage.
• Clearly communicate and share your analysis with members of the SOC and/or clients.
• Carry out Level 2 triage of escalated issues
• Carry out incident response for high complexity security incidents
• Investigate intrusion attempts and perform in-depth analysis of exploits.
• Conduct proactive threat research.
• Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident.
• Create a final incident report detailing the events of the incident
• Develop or change new or existing rules, content rules, and settings on at least one of the technologies: 1.EDR(Antivirus), 2. NGFW IDS/IPS rules, 3. DLP Policies, and 4. SIEM content and rules
• Perform Computer Security Incident Response activities for organizations, coordinate with other enterprise IT teams to record and report incidents.
• Conduct forensics and investigations as needed using security tools
• Conduct proactive threat research.
• Recognize potential, successful, and unsuccessful intrusion attempts and compromises through reviews and analysis of security tools
• Investigate, interpret, and responds to technical and/or complex IT security data.
• Participate actively in the resolution of incidents, even after they are escalated
• Document all activities during an incident and providing leadership with status updates during the life cycle of the incident.

Requirements

• Excellent written and oral communication skills (Bulgarian/English)
• Self-motivated and able to work in an independent manner
• Work experience in IT position 2+ years, or Bachelor’s degree in an IT related field or equivalent education
• Solid Understanding of TCP/IP, SMTP, the OSI Model, and underlying Protocols
• Solid Understanding of MITTRE ATT&CK Matrix
• Skills in Incident Response and Intrusion Monitoring
• Understanding of one OR more security solutions like: Data loss prevention (DLP), SIEM, NGFW IPS/IDS, Email Gateway (ESA), Web Gateway (WSA), Web Application Firewall (WAF), Database security, session monitoring, and others equivalent cyber security solutions
• Experience working with various security methodologies and processes
• Experience providing analysis and trending of security log data from a large number of heterogeneous security devices
• Knowledge and experience configuring a diverse array of technical security solutions

Preferred Qualifications

• Previous experience in a SOC as an Analyst, Engineer or in a Malware analysis/Threat research role
• Experience implementing incident handling guidelines
• Speed and responsiveness in the resolution of issues
• Experience providing analysis and trending of security log data from a large number of heterogeneous devices/ environment
Education (only for SOC Level 3 with Incident Response)
• Graduation from a four-year university with a degree or major course work in computer science, communications, networking, engineering or other computer-related IT field or study

Desired Skills / Will be considered advantage/

• Certifications include: CISSP, GREM, GCIH, GCIA, CEH, GCED, GCFA, OSCP
• Technical certifications
• Prior experience successfully providing the full range of IT cyber security tasks.
• Strong working knowledge with industry IT security tools
• Able to work independently and complete projects with little supervision.

Ако прояваявате интерес към настоящата обява, моля да изпратите своето CV на career@mnemonica.bg Всички данни, предоставени от Вас, са защитени по смисъла на ЗЗЛД и ще бъдат използвани единствено за целите на настоящия подбор.