ARCHIVED
This job listing has been archived and is no longer accepting applications.
MisuJob - AI Job Search Platform MisuJob

Cyber Incident Response Analyst

Control Risks

São Paulo, State of São Paulo, Brazil permanent

Posted: February 19, 2026

Interested in this position?

Create a free account to apply with AI-powered matching

Quick Summary

Cyber Incident Response Analyst is responsible for filtering out noise, identifying real threats, and ensuring critical incidents are enriched with context and escalated to specialized squads with maximum efficiency.

Job Description

This role requires both in-person and 12x36 shift work. Shifts are 12 hours, with 36 hours off in between. Please submit CVs in English.

As a Triage Analyst within the Global Security Operations Center (GSOC), you will serve as the first line of defense for the CSIRT squad. Your primary mission is the high-precision screening and validation of security events. You will be responsible for filtering out the "noise," identifying real threats among thousands of alerts, and ensuring that critical incidents are enriched with context and escalated to specialized squads with maximum efficiency. This role is balance between technical alertness and rapid decision-making.

Core Responsibilities

• Alert Monitoring & Queue Management: Actively monitor SIEM, EDR, and cloud security consoles to identify suspicious activity. Maintain a high pace of alert processing while ensuring no critical signal is missed.
• Validation & Classification: Distinguish between false positives and true security incidents. Assign correct severity levels based on business impact, asset criticality, and the current threat landscape.
• Incident Enrichment: Perform initial "deep dives" on alerts by collecting relevant evidence (logs, process trees, network traffic, and metadata). Use OSINT and internal tools to provide immediate context for the CSIRT responders.
• Initial Containment (Tier 1 Response): Execute standardized playbooks for immediate threat mitigation, such as isolating compromised hosts, revoking session tokens or blocking malicious IPs/domains to minimize "blast radius."
• Seamless Escalation: Draft high-quality hand-off reports for the CSIRT squad, ensuring all technical indicators (IOCs) and initial findings are clearly documented to reduce Mean Time to Respond (MTTR).
• External Threat Screening: Monitor Dark Web, social media, and phishing repositories for targeted campaigns, performing the initial triage of leaked credentials or mentions of the company.


Requirements:
Technical Requirements

• Log Analysis: Proficiency in analyzing logs from multiple sources (Windows/Linux Event Logs, Firewall, Proxy, AWS/Azure/GCP, and O365).
• Network Fundamentals: Solid understanding of TCP/IP, DNS, HTTP/S, and common attack vectors (DDoS, SQLi, Brute Force).
• Tooling: Familiarity with SIEM/EDR platforms and triage-assistance tools (e.g., VirusTotal, Any.Run, URLScan, Joe Sandbox, AbuseIPDB).
• Frameworks: Understanding of the MITRE ATT&CK framework to categorize observed attacker behavior during the triage process.

Qualifications and specialist skills

• Bachelor’s degree in computer science, Computer Engineering or related fields.
• Experience: At least 1 year of experience in a SOC or Incident Response environment, specifically handling high-volume alert queues.
• Languages: Fluency in Portuguese and English is mandatory for technical reporting and global collaboration.

Behaviors

• All employees are expected to display behaviours reflective of our company values: Integrity and Ethics, Collaboration and Teamwork, Commitment to People and Professionalism and Excellence.

Please submit CVs in English.

Why Apply Through MisuJob?

AI-Powered Job Matching: MisuJob uses advanced artificial intelligence to analyze your skills, experience, and career goals. Our matching algorithm compares your profile against thousands of job requirements to find positions where you have the highest chance of success. This saves you hours of manual job searching and ensures you only see relevant opportunities.

One-Click Applications: Once you create your profile, applying to jobs is effortless. Your resume and cover letter are automatically tailored to highlight the most relevant experience for each position. You can apply to multiple jobs in minutes, not hours.

Career Intelligence: Beyond job matching, MisuJob provides valuable career insights. See how your skills compare to market demands, identify skill gaps to address, and understand salary benchmarks for your experience level. Make data-driven decisions about your career path.

Frequently Asked Questions

How do I apply for this position?

Click the "Register to Apply" button above to create a free MisuJob account. Once registered, you can apply with one click and track your application status in your dashboard.

Is MisuJob free for job seekers?

Yes, MisuJob is completely free for job seekers. Create your profile, get matched with jobs, and apply without any cost. We help you find your dream job without any hidden fees.

How does AI matching work?

Our AI analyzes your resume, skills, and experience to understand your professional profile. It then compares this against job requirements using natural language processing to calculate a match percentage. Higher matches mean better fit for the role.

Can I apply to jobs in other countries?

Absolutely. MisuJob features jobs from companies worldwide, including remote positions. Filter by location or look for remote opportunities to find jobs that match your preferences.

Ready to Apply?

Join thousands of job seekers using MisuJob's AI to find and apply to their dream jobs automatically.

Register to Apply