Job Description
For N1 profiles:
Profile sought
Education: BAC+5 diploma in IT, cybersecurity, networks, or in a related field (Master's, Engineering diploma).
Experience: Minimum 1 year of experience in a similar role (SOC Analyst, Security Administrator, etc.).
Certification: CEH (Certified Ethical Hacker) certification required .
Technical skills:
Solid knowledge of security concepts (threat intelligence, vulnerabilities, attacks, malware).
Mastery of network protocols and architectures (TCP/IP, LAN, WAN).
Hands-on experience with at least one SIEM tool (Splunk, QRadar, Elastic Stack, etc.).
Knowledge of operating systems (Windows, Linux) and virtualized environments.
Scripting skills (Python, PowerShell, Bash) are a plus.
For N2:
Profile sought
Education: BAC+5 diploma in IT, cybersecurity, or equivalent (Master's, Engineering diploma).
Experience: Minimum 3 years of proven experience in a role as a SOC Analyst, Cybersecurity Engineer or Security Consultant.
Certification: CEH (Certified Ethical Hacker) certification required. Other recognized certifications such as GCIH, CySA+, OSCP, or CISSP are a major asset.
Technical skills:
In-depth expertise in SIEM (rule creation, fine-tuning, incident management).
Excellent understanding of attacks and methodologies (Kill Chain, MITRE ATT&CK).
Proficiency in log analysis tools, network packets (Wireshark, tcpdump) and intrusion detection systems (IDS/IPS).
Good knowledge of digital forensic analysis (DFIR) and malware analysis.
Advanced scripting skills (Python, PowerShell) for automation and analysis.
Knowledge of Cloud environments (AWS, Azure, GCP) and their security issues.
For N3:
Profile sought
Education: BAC+5 diploma in cybersecurity, IT, or equivalent (Master's, Engineering diploma).
Experience: Minimum 5 years of experience in a SOC or in cybersecurity expert roles (forensics, threat hunting, incident response).
Certification: CEH (Certified Ethical Hacker) certification required. Other expert-level certifications such as GCIH, CISSP, OSCP, or SANS certifications are highly valued.
Technical skills:
Advanced proficiency in SIEM, SOAR platforms and EDR tools.
Expertise in digital forensic analysis and reverse engineering (malware analysis).
Advanced scripting skills (Python) for automation and analysis of security data.
In-depth knowledge of Cloud environments (AWS, Azure, GCP) and their security architectures.
Excellent understanding of cyber attacker TTPs, vulnerabilities and exploits.