**CSOC Analyst** **About SLB** **About the Bogota Information Technology Center (BITC)** The Bogota Information Technology Center (BITC) has a fundamental and critical role in SLB corporate transformation and for delivering digital solutions to the larger organization. Our company has embarked on a corporate transformation to deliver a step change in the reliability, efficiency and integration of our technologies, products and services. Advanced technologies are key enablers to this and encompass all aspects of business systems, including the organization platform and processes. Investments in and building strong competences across our technology pillars - SAP, Digital Enterprise Systems, Data and Analytics, Digital Operations, Security are key to an integrated digital that is positioned to deliver superior results. **About this role** Identify, analyze, communicate, defend, and contain information security incidents. **Responsibilities** - Conducts network monitoring and intrusion detection analysis using various computer network defense tools, such as intrusion detection/prevention systems (IDS/IPS), firewalls, host-based security systems (HBSS), etc. - Correlates network activity across networks to identify trends of unauthorized use - Research emerging threats and vulnerabilities to aid in the identification of incidents - Analyze the results of the monitoring solutions, assess, and correlate the output using automated systems. Conduct triage, event correlation, classification, and analysis of these events such that incidents are investigated and logged or followed up using the existing information risk incident management processes - Provide pro-active feedback which will enable improvement of the current monitoring rules, based on information and knowledge/experience from Schlumberger and Industry best practices. - Capable of working unsupervised, but able to interact and give direction to business and IT (Information Technology) teams in line within established corporate security policies and processes. - Develops and maintains constructive and cooperative working relationships with team members - Demonstrates the ability to drive creative, innovative ways to solve problems or minimize risk - Consultative skills and ability to work cross-functionally - Focused and results oriented - Ability to react quickly, decisively, and deliberately in high-stress, high-impact situations - Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one **Qualifications and Requirements** - Essential qualifications_ - Bachelor’s or master's degree in a technical field such as computer science, Cyber Security, Management Information Technology, Engineering, and Mathematics is strongly preferred - Information Security Experience: o For T1: 1-2 years (or appropriate internships in CS if fresh out of college) o For T2: 3-5 years (IR or SOC (Security Operation Center) experience highly desired) o For T3: 5-10 years - Must be able to work flexible hours including early/late shift, weekends, and public holiday - Fluent in English - Ability to read and understand additional languages is a strong advantage - Effective communication skills - Must possess excellent work habits, a strong work ethic, and be able to adhere to company work hours, policies, and standard business etiquette - Keen to continue self-development - Demonstrate at least 5 of the skills listed in the “Technical Skill” section - Triage security events - Follow existing incident playbooks - Contribute to the improvement and creation of playbooks - Learn new skills across all technical domains - Use public cyber security resources (e.g., sites/blogs/podcasts) to stay up to date with latest news / threats - Show a commitment to progress towards T2 Certifications (1 or more of the following) Current (not future/or planned) - Certification are preferable - SANS (SysAdmin, Audit, Network, and Security) GIAC (Global Information Assurance Certification) certification in Cyber Defense, Penetration Testing, Incident Response or Forensics - Certified Information Systems Security Professional (CISSP) - Certified Information Security Manager (CISM) - EC-Council certification: CEH (Certified Ethical Hacker), ECSA (Certified Security Analyst), CHFI (Computer Hacking Forensic Investigator), CND (Certified Network Defender) - Cisco Certified Network Associate (CCNA) Technical Skills - Data Security o Data Loss Prevention tools, (e.g., AIP (Azure Information Protection), IRM (Information Rights management)) - Endpoint o Antivirus solutions (e.g., Microsoft Defender) o Strong Windows and Linux administration experience o Information Security tools & packet analyses tools (e.g., Cb, Wireshark)OT/IIoT Security o Awareness of SCADA (Supervisory Control and Data Acquisition) / IIoT (Industrial Internet of Things) technologies - Network Security o Firewall (e.g., Pato Al