Natixis in Portugal is a Centre of Expertise whose mission is to transform traditional banking by developing innovative solutions for the business, operations and work culture of Groupe BPCE worldwide.
As part of Groupe BPCE’s international division, Natixis in Portugal designs and delivers solutions for its two core areas — Corporate & Investment Banking and Asset & Wealth Management — as well as transversal services that support all entities across the Group.
With more than 3,000 employees representing 46 nationalities, the teams work across Information Technology, Banking Support Activities, and Compliance, in an integrated, inclusive, and cross-functional way, supporting all business lines and platforms of the Group.
A disruptive mindset and a culture of proximity and agility identify Natixis in Portugal Team and reflect the company's mission to transform traditional banking at a global scale: a perfect match in the Portuguese dynamics and entrepreneurial ecosystem.
Generic Responsibilities
- Deploys and configures various security technologies such as firewalls, intrusion detection/prevention systems, encryption mechanisms, antivirus software, and access control systems, to protect the infrastructure and the network.
- Analyzes new logs, correlation rules, maintains existing rules and different components of the SIEM alerting GUI (Dashboard, Alerting, etc.), to enable a dignosis of malicious codes (e.g. Sandbox or manually).
- Handles tickets, qualifies the security incidents and determines the scope of compromising data or components.
- Monitors the network and systems for any signs of security breaches or unauthorized access attempts, to maintain the security infrastructure in operational condition with a view to quality, productivity and security.
- Ensures the proper functioning and planning of technical platforms and availability of technical resources.
- Plans penetration tests on computer systems, networks, web-based and mobile applications and selects and creates the appropriate tools for testing.
- Conducts vulnerability assessments and penetration testing by simulating attacks to identify weaknesses and vulnerabilities in systems and applications.
- Gathers data from all stages, analyzes outcomes and makes recommendations to mitigate vulnerabilities and reports on the findings to SOC analysts.
- Actively engages in and apply various development methodologies, to effectively collaborate, contribuiting for successful delivery as well as improving the development process.
- Keeps up-to-date with the Industry and best practice trends, using insights to implement new processes and initiatives in the organization.
Specific Responsibilities
- Investigates and analyzes security incidents in levels 1 and 2, collects technical data, identifies the root cause and severities, and takes corrective measures to mitigate the impact and prevent future incidents.
- Participates in the installation of security infrastructures, configuration and validation of security infrastructure components.
- Investigates and analyzes security incidents in levels 1 and 2, collects technical data, identifies the root cause and severities, and takes corrective measures to mitigate the impact and prevent future incidents.
- Participates in the installation of security infrastructures, configuration and validation of security infrastructure components.
- One or more of following programing languages and scripting languages (Python, JavaScript, C, C++, Assembler, Shell)
- Knowledge of SIEM solutions
- Experience with Splunk search syntax and Regex
- Operating system : Unix, Linux, Windows, Android/IOS
- System security vulnerabilities and remediation techniques, including how system processes are working
- Network protocols TCP/IP, routing, IPsec and VPN
- Good knowledge on Internet application protocols weaknesses and vulnerabilities: HTTP[S], SMTP, DNS, NTP, LDAP, SIP, SAMBA, SSH, etc
- Internet architecture definition
- Vulnerability analysis and assessment tools
- Penetration testing methods and tools, especially Web exploits (injections SQL, XSS/CSRF, etc.)
- Static and dynamic analysis tools (ollyDBG, windbg, immunity debugge, x64dbg, IDA)
- Cyberattacks and counter-measures (network, system, application)
- Application vulnerabilities (web browser, office application, web servers, database, etc.)
- Firewalls - Palo Alto, Fortinet, Checkpoint
- Proxy & Reverse Proxy - McAfee Web Gateway, R&S
- Cisco ISE
- One or more of following programing languages and scripting languages (Python, JavaScript, C, C++, Assembler, Shell)
- Knowledge of SIEM solutions
- Experience with Splunk search syntax and Regex
- Operating system : Unix, Linux, Windows, Android/IOS
- System security vulnerabilities and remediation techniques, including how system processes are working
- Network protocols TCP/IP, routing, IPsec and VPN
- Good knowledge on Internet application protocols weaknesses and vulnerabilities: HTTP[S], SMTP, DNS, NTP, LDAP, SIP, SAMBA, SSH, etc
- Internet architecture definition
- Vulnerability analysis and assessment tools
- Penetration testing methods and tools, especially Web exploits (injections SQL, XSS/CSRF, etc.)
- Static and dynamic analysis tools (ollyDBG, windbg, immunity debugge, x64dbg, IDA)
- Cyberattacks and counter-measures (network, system, application)
- Application vulnerabilities (web browser, office application, web servers, database, etc.)
- Firewalls - Palo Alto, Fortinet, Checkpoint
- Proxy & Reverse Proxy - McAfee Web Gateway, R&S
- Cisco ISE
Our workplace reflects the vibrant spirit of our locations, with initiatives such as a Green Transportation Budget, electric bikes and a flexible Hybrid Work Policy. We promote wellbeing through the Honolulu Wellness Club, a Prayer Room, a Lactation Room, and themed Villages that inspire creativity and collaboration. Through our ESG and DEI strategies, we are commit to being inclusive, caring, and fair, ensuring every voice is heard and valued.