6 months ago
Telefónica is on a truly inspirational adventure. As one of the world’s most innovative communication companies and the name behind flagship brands such as O2, we’re thinking bigger than ever before. We’re taking on new challenges around the world and exploring new ways to open up the world for our millions of customers. And you could be part of it all.
About the Team:
You’ll be joining a very new and exciting part of Telefonica. Have you heard of Smart Metering Implementation Plan (SMIP)? Well you’ll get the chance to support one of the largest smart metering projects in the world, providing communications services to the Public Sector! The team will perform a key role in the monitoring and management of Smart Metering infrastructure through the new Security Operations Centre (SOC) service we are building from scratch. It acts as the central point of contact for monitoring, and reacting to, any event that may affect the security of the Smart Metering network communications between the Communications Hub in the consumer’s premises to receipt by the Data Service Provider (DSP) and interfaces into dedicated and shared technology services.
The SOC Analyst is part of the shift based SOC Team that monitors and responds to any identified event from the security monitoring processes in place or any reported security event or incident. Once reported, any event or incident is classified according to internal procedures and handled through to resolution by the SOC team with external assistance as appropriate.
From a Smart Metering Key Infrastructure (SMKI) perspective, the SOC Manager and the SOC shift team will perform a role of Authorised Responsible Officer (ARO) will hold access to the SMKI Portal and Repository.
As this is a new service, you will have a significant opportunity to help us build, shape and develop a totally new service.
-Monitoring for events across multiple security technologies, including intruder detection systems, malware detection, file integrity systems, SIEM toolset and others as defined for this service;
-Ensure that SOC scheduled tasks, reported events and incidents are appropriately progressed.
-Assisting as required with Security, Risk, Compliance and Service reporting.
-Supporting Analysts in the resolution of incidents where the defined procedure for an incident cannot be followed but escalation is not appropriate.
-Responding to incidents where a detailed understanding of the monitored estate is required and is beyond the capabilities of the Support Analysts.
Skills & experience:
- Previous experience within a Cyber/security role
-Excellent interpersonal skills.
-Appreciation of an operational environment.
-High standard of accuracy and attention to detail.
-Desire to work as part of a team and contribute to the team’s objectives.
Understanding of network management, networking or system administration.
-Experience with SIEM, Analytics and Incident Management toolsets, ideally HP ArcSight, Splunk and Resilient Systems’ IRP and BMC Remedy.
-Understanding of ISO 27001, ITIL or ISO 20000, ISO 22301 and relevant CESG GPGs
-Experience with Intrusion Detection Systems (IDS) /Intrusion Prevention Systems (IPS)
-An understanding of cryptography and related concepts and principles(e.g., encryption algorithms, hash functions, PKI, key exchange, certification authorities, digital signatures)
-An understanding of cryptographic standards and protocols (e.g., PKCS, FIPS 140–2, IPSec, SSL/TLS).
Experience managing relationships with third parties.
There’s so much to discover. Your adventure starts here.