Obrela Security Industries provides information security consulting services and products to assess and manage risk in complex enterprise environments. Our services cover key aspects of information security including management frameworks; threat/risk profiling; process modeling; on-line transaction integrity; critical infrastructure resilience and sustainability; wireless and wired networks analysis; education and awareness; crisis management; and compliance.
+30 210 957 3750
Assessments of the network, system and applications security mechanisms that clients apply in order to protect its information resources that go by the organisation’s network.
The aim is to assure that the application is secured applying organisation and technological controls which comply with internationally best security practices, protecting the information that the application processes, stores and manages. Systems and applications are tested against the known security practices to ensure they adequately protect the business information that “passes” through it.
CREST Qualified Consultants:
- CREST Registered Penetration Tester
- CREST Practitioner Security Analyst
Cyber Security Incident Response
Emergency Help: +30 211 800 3865
Obrela Security Industries (OSI) applies CSIR procedures in the context of a set of Real Time Threat Management Process, followed by OSI in their SIEM service. The Real Time Threat Management process is comprised of a number sub-processes and acts as a wrapper for the Event Management services. The process starts with incident identification or incident investigation, continues with the incident resolution, incident escalation and reporting.
Security Operations Centres (SOC)
OBRELA’s MDR services combine intelligence with security analytics and risk management technology to support real-time threat monitoring and detection. Using state-of-the-art SIEM technology, we collect and analyze security related data from systems, networks, applications, users generating valuable intelligence for cyber security threats.
SOCaaS complements the SIEMaaS offering utilizing and operating our SIEM technology as per client’s security requirements and rules of engagement providing 24x7x365 monitoring, incident escalation and remote security incident response until incidents closure.
- Application Audited
- Externally Validated
Contact: Iraklis Mathiopoulos
Description The Cyber Analyst performs real time event and incident management processes of SOC, as well as internal security incidents evaluation and response following the event management guidelines and policies of SOC. Real-Time Event & Log monitoring and analysis using leading SIEM Technology Security Incidents identification and 1st-level investigation Escalation to Level 2 Analysts for incident response Requirements Ability to work on a flexible, rotational 24x7x365 schedule Knowledge and understanding of standard & modern attack techniques on applications, systems and networks Knowledge of TCP/IP, Linux and Windows infrastructures and basic network security architecture concepts Excellent verbal and written communication skills, both in English and Greek language Analytical and troubleshooting skills on short timeframes No prior working experience with SIEM/Log Analysis is required, but it will be considered a plus. Benefits Dynamic and respectful environment – our people are the core of our business, we value each and every individual and support initiatives, promoting agility and work/life balance. Continuous coaching – work with passionate people and receive both theoretical as well as hands-on training Career development. Expand your career internationally and work alongside knowledgeable people from diverse cultures and backgrounds A competitive compensation package dependent upon your experience and qualifications. We’re focused on rewarding efforts. Our salaries and benefits package will keep you motivated throughout your career