{"id":20656,"date":"2026-02-07T09:51:00","date_gmt":"2026-02-07T09:51:00","guid":{"rendered":"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/"},"modified":"2026-02-07T09:51:59","modified_gmt":"2026-02-07T09:51:59","slug":"72431189-29bf-46f6-9a48-9c57296e9cae","status":"publish","type":"post","link":"https:\/\/thefundmentor.com\/it\/72431189-29bf-46f6-9a48-9c57296e9cae\/","title":{"rendered":"Consultant Cybers\u00e9curit\u00e9 N2 SOC : Automatisation et Analyse des Incidents"},"content":{"rendered":"<\/p>\n<\/p>\n<div style=\"background: #ffffff; border-radius: 12px; box-shadow: 0 10px 30px rgba(0, 0, 0, 0.1); width: 100%; max-width: 340px; padding: 25px; transition: transform 0.3s ease-in-out; overflow: visible; display: flex; flex-direction: column; position: relative; border: 1px solid #28a745; margin-top: 70px; margin-bottom: 50px; margin-left: auto; margin-right: auto;\">\n<div style=\"position: absolute; top: -35px; right: 15px; color: #28a745; padding: 5px 10px; border-radius: 6px; font-size: 14px; font-weight: bold; display: flex; align-items: center; z-index: 10;\">Consigliato per voi<\/div>\n<div data-namespace-header=\"\" style=\"\">\n<h3 data-namespace-title=\"\" style=\"color: #333; font-size: 20px; font-weight: bold; text-align: left; margin-right: 50px; min-height: 50px; margin-top: 0px;\">Consultant Cybers\u00e9curit\u00e9 N2 SOC<\/h3>\n<\/p><\/div>\n<p data-namespace-prompt=\"\" style=\"font-size: 16px; color: #666; margin-bottom: 20px; line-height: 1.5; flex-grow: 1; text-align: left; margin-top: 0px;\">Analysez les incidents de cybers\u00e9curit\u00e9 au sein du SOC, g\u00e9rez les vuln\u00e9rabilit\u00e9s et contribuez \u00e0 l\u2019automatisation. Bac+5, exp\u00e9rience confirm\u00e9e, t\u00e9l\u00e9travail 2j\/semaine.<\/p>\n<p>    <a data-namespace-url=\"\" href=\"https:\/\/thefundmentor.com\/it\/redirect\/?https:\/\/www.free-work.com\/fr\/tech-it\/business-analyst\/job-mission\/analyst-soc-11?utm_campaign=google_jobs_apply&#038;utm_source=google_jobs_apply&#038;utm_medium=organic\" style=\"width: 100%; display: inline-block; color: white; text-decoration: none; border-radius: 6px; font-size: 16px; font-weight: bold; text-align: center; transition: transform 0.3s ease, background 0.3s ease; margin-top: auto;\" data-namespace-id=\"5c0d2565-3ba9-4280-a382-ad2a691e2285\"><br \/>\n        <button style=\"width: 100%; height: 55px; background: #e9e9ed; border: 1px solid black; color: black;\">Postuler \u00e0 l&#039;offre<\/button><br \/>\n    <\/a><br \/>\n    <small style=\"margin-top: 10px; color: #777; font-size: 12px; text-align: center; display: block;\">Vous serez redirig\u00e9 vers un altro sito<\/small>\n<\/div>\n<p>Cette mission de Consultant Cybers\u00e9curit\u00e9 N2 SOC, propos\u00e9e par une ESN reconnue, se distingue par une forte orientation vers l&#8217;automatisation du SOC et l&#8217;analyse proactive des incidents. Les informations sur la r\u00e9mun\u00e9ration sont \u00e0 d\u00e9finir selon l\u2019exp\u00e9rience, tout en offrant la flexibilit\u00e9 du t\u00e9l\u00e9travail deux jours par semaine. Le poste est ouvert en ind\u00e9pendant (freelance), et une exp\u00e9rience op\u00e9rationnelle en environnement SOC est requise.<\/p>\n<h2>Vos missions et responsabilit\u00e9s au quotidien<\/h2>\n<p>Le consultant int\u00e9gr\u00e9 au SOC sera charg\u00e9 de d\u00e9tecter, qualifier et analyser des incidents de s\u00e9curit\u00e9 touchant l\u2019infrastructure, les applications et les processus m\u00e9tiers.<\/p>\n<p>La gestion des vuln\u00e9rabilit\u00e9s sera centrale, incluant leur prise en charge, qualification et suivi tout au long du processus de rem\u00e9diation.<\/p>\n<p>Il pilotera la r\u00e9ponse aux incidents et contribuera \u00e0 la mise en place de sc\u00e9narios de d\u00e9tection avanc\u00e9e, particuli\u00e8rement autour des fuites d\u2019informations.<\/p>\n<p>Un usage expert des solutions telles que Splunk est imp\u00e9ratif pour le traitement des alertes et l\u2019automatisation des t\u00e2ches courantes.<\/p>\n<p>Le consultant devra \u00e9galement garantir la conformit\u00e9 r\u00e9glementaire, notamment la restriction aux ressortissants de l\u2019Union Europ\u00e9enne.<\/p>\n<h2>Avantages principaux du poste<\/h2>\n<p>Le r\u00f4le propos\u00e9 met en avant une belle autonomie, une valorisation de l\u2019expertise technique et une interaction directe avec d\u2019autres experts passionn\u00e9s.<\/p>\n<p>Vous \u00e9voluez dans un environnement humain, reconnu pour l\u2019innovation, la convivialit\u00e9 et l\u2019engagement collectif.<\/p>\n<p>Gr\u00e2ce \u00e0 la diversit\u00e9 des missions, le d\u00e9veloppement des comp\u00e9tences est acc\u00e9l\u00e9r\u00e9 et vous gagnez en polyvalence sur les technologies SOC modernes.<\/p>\n<h2>Quelques inconv\u00e9nients \u00e0 prendre en compte<\/h2>\n<p>Le poste requiert une exp\u00e9rience op\u00e9rationnelle solide ainsi qu\u2019une grande rigueur dans l\u2019application des processus s\u00e9curitaires, ce qui peut repr\u00e9senter une charge de responsabilit\u00e9 importante.<\/p>\n<p>Seuls les ressortissants europ\u00e9ens peuvent postuler, ce qui peut limiter l\u2019acc\u00e8s pour certains candidats qualifi\u00e9s.<\/p>\n<h2>Notre verdict sur le poste<\/h2>\n<p>Ce poste de Consultant Cybers\u00e9curit\u00e9 N2 SOC offre \u00e0 la fois challenge technique et flexibilit\u00e9. Il s\u2019adresse aux freelances ambitieux appr\u00e9ciant un environnement structurant et des projets sensibles. C\u2019est une excellente opportunit\u00e9 pour d\u00e9velopper son expertise en cybers\u00e9curit\u00e9 tout en profitant de conditions de travail attractives.<\/p>\n<div style=\"background: #ffffff; border-radius: 12px; box-shadow: 0 10px 30px rgba(0, 0, 0, 0.1); width: 100%; max-width: 340px; padding: 25px; transition: transform 0.3s ease-in-out; overflow: visible; display: flex; flex-direction: column; position: relative; border: 1px solid #28a745; margin-top: 70px; margin-bottom: 50px; margin-left: auto; margin-right: auto;\">\n<div style=\"position: absolute; top: -35px; right: 15px; color: #28a745; padding: 5px 10px; border-radius: 6px; font-size: 14px; font-weight: bold; display: flex; align-items: center; z-index: 10;\">Consigliato per voi<\/div>\n<div data-namespace-header=\"\" style=\"\">\n<h3 data-namespace-title=\"\" style=\"color: #333; font-size: 20px; font-weight: bold; text-align: left; margin-right: 50px; min-height: 50px; margin-top: 0px;\">Consultant Cybers\u00e9curit\u00e9 N2 SOC<\/h3>\n<\/p><\/div>\n<p data-namespace-prompt=\"\" style=\"font-size: 16px; color: #666; margin-bottom: 20px; line-height: 1.5; flex-grow: 1; text-align: left; margin-top: 0px;\">Analysez les incidents de cybers\u00e9curit\u00e9 au sein du SOC, g\u00e9rez les vuln\u00e9rabilit\u00e9s et contribuez \u00e0 l\u2019automatisation. Bac+5, exp\u00e9rience confirm\u00e9e, t\u00e9l\u00e9travail 2j\/semaine.<\/p>\n<p>    <a data-namespace-url=\"\" href=\"https:\/\/thefundmentor.com\/it\/redirect\/?https:\/\/www.free-work.com\/fr\/tech-it\/business-analyst\/job-mission\/analyst-soc-11?utm_campaign=google_jobs_apply&#038;utm_source=google_jobs_apply&#038;utm_medium=organic\" style=\"width: 100%; display: inline-block; color: white; text-decoration: none; border-radius: 6px; font-size: 16px; font-weight: bold; text-align: center; transition: transform 0.3s ease, background 0.3s ease; margin-top: auto;\" data-namespace-id=\"5c0d2565-3ba9-4280-a382-ad2a691e2285\"><br \/>\n        <button style=\"width: 100%; height: 55px; background: #e9e9ed; border: 1px solid black; color: black;\">Postuler \u00e0 l&#039;offre<\/button><br \/>\n    <\/a><br \/>\n    <small style=\"margin-top: 10px; color: #777; font-size: 12px; text-align: center; display: block;\">Vous serez redirig\u00e9 vers un altro sito<\/small>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>D\u00e9couvrez une mission de consultant SOC N2 freelance : analyse incidents de s\u00e9curit\u00e9, automatisation, gestion vuln\u00e9rabilit\u00e9s. Profitez d&#8217;un environnement d&#8217;experts et du t\u00e9l\u00e9travail flexible.<\/p>","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[9],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Consultant Cybers\u00e9curit\u00e9 N2 SOC : Automatisation et Analyse des Incidents - The Fund Mentor<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thefundmentor.com\/it\/72431189-29bf-46f6-9a48-9c57296e9cae\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consultant Cybers\u00e9curit\u00e9 N2 SOC : Automatisation et Analyse des Incidents - The Fund Mentor\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez une mission de consultant SOC N2 freelance : analyse incidents de s\u00e9curit\u00e9, automatisation, gestion vuln\u00e9rabilit\u00e9s. Profitez d&#039;un environnement d&#039;experts et du t\u00e9l\u00e9travail flexible.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thefundmentor.com\/it\/72431189-29bf-46f6-9a48-9c57296e9cae\/\" \/>\n<meta property=\"og:site_name\" content=\"The Fund Mentor\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-07T09:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-07T09:51:59+00:00\" \/>\n<meta name=\"author\" content=\"Bruno Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruno Gianni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/\"},\"author\":{\"name\":\"Bruno Gianni\",\"@id\":\"https:\/\/thefundmentor.com\/#\/schema\/person\/d52888235fd6563bd07d97185d6a61e4\"},\"headline\":\"Consultant Cybers\u00e9curit\u00e9 N2 SOC : Automatisation et Analyse des Incidents\",\"datePublished\":\"2026-02-07T09:51:00+00:00\",\"dateModified\":\"2026-02-07T09:51:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/\"},\"wordCount\":497,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/thefundmentor.com\/#organization\"},\"articleSection\":[\"Hidden\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/\",\"url\":\"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/\",\"name\":\"Consultant Cybers\u00e9curit\u00e9 N2 SOC : Automatisation et Analyse des Incidents - The Fund Mentor\",\"isPartOf\":{\"@id\":\"https:\/\/thefundmentor.com\/#website\"},\"datePublished\":\"2026-02-07T09:51:00+00:00\",\"dateModified\":\"2026-02-07T09:51:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thefundmentor.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consultant Cybers\u00e9curit\u00e9 N2 SOC : Automatisation et Analyse des Incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thefundmentor.com\/#website\",\"url\":\"https:\/\/thefundmentor.com\/\",\"name\":\"The Fund Mentor\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/thefundmentor.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thefundmentor.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/thefundmentor.com\/#organization\",\"name\":\"The Fund Mentor\",\"url\":\"https:\/\/thefundmentor.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/thefundmentor.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/thefundmentor.com\/wp-content\/uploads\/sites\/506\/2025\/11\/Logo-The-Fund-Mentor.png\",\"contentUrl\":\"https:\/\/thefundmentor.com\/wp-content\/uploads\/sites\/506\/2025\/11\/Logo-The-Fund-Mentor.png\",\"width\":600,\"height\":600,\"caption\":\"The Fund Mentor\"},\"image\":{\"@id\":\"https:\/\/thefundmentor.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/thefundmentor.com\/#\/schema\/person\/d52888235fd6563bd07d97185d6a61e4\",\"name\":\"Bruno Gianni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/thefundmentor.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0f5d42d7bf77874643c1478932860e3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0f5d42d7bf77874643c1478932860e3f?s=96&d=mm&r=g\",\"caption\":\"Bruno Gianni\"},\"description\":\"Bruno writes the way he lives, with curiosity, care, and respect for people. He likes to observe, listen, and try to understand what is happening on the other side before putting any words on the page.For him, writing is not about impressing, but about getting closer. It is about turning thoughts into something simple, clear, and real. Every text is an ongoing conversation, created with care and honesty, with the sincere intention of touching someone, somewhere along the way.\",\"url\":\"https:\/\/thefundmentor.com\/it\/author\/bcgianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Consultant Cybers\u00e9curit\u00e9 N2 SOC : Automatisation et Analyse des Incidents - The Fund Mentor","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thefundmentor.com\/it\/72431189-29bf-46f6-9a48-9c57296e9cae\/","og_locale":"it_IT","og_type":"article","og_title":"Consultant Cybers\u00e9curit\u00e9 N2 SOC : Automatisation et Analyse des Incidents - The Fund Mentor","og_description":"D\u00e9couvrez une mission de consultant SOC N2 freelance : analyse incidents de s\u00e9curit\u00e9, automatisation, gestion vuln\u00e9rabilit\u00e9s. Profitez d'un environnement d'experts et du t\u00e9l\u00e9travail flexible.","og_url":"https:\/\/thefundmentor.com\/it\/72431189-29bf-46f6-9a48-9c57296e9cae\/","og_site_name":"The Fund Mentor","article_published_time":"2026-02-07T09:51:00+00:00","article_modified_time":"2026-02-07T09:51:59+00:00","author":"Bruno Gianni","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruno Gianni","Est. reading time":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/#article","isPartOf":{"@id":"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/"},"author":{"name":"Bruno Gianni","@id":"https:\/\/thefundmentor.com\/#\/schema\/person\/d52888235fd6563bd07d97185d6a61e4"},"headline":"Consultant Cybers\u00e9curit\u00e9 N2 SOC : Automatisation et Analyse des Incidents","datePublished":"2026-02-07T09:51:00+00:00","dateModified":"2026-02-07T09:51:59+00:00","mainEntityOfPage":{"@id":"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/"},"wordCount":497,"commentCount":0,"publisher":{"@id":"https:\/\/thefundmentor.com\/#organization"},"articleSection":["Hidden"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/","url":"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/","name":"Consultant Cybers\u00e9curit\u00e9 N2 SOC : Automatisation et Analyse des Incidents - The Fund Mentor","isPartOf":{"@id":"https:\/\/thefundmentor.com\/#website"},"datePublished":"2026-02-07T09:51:00+00:00","dateModified":"2026-02-07T09:51:59+00:00","breadcrumb":{"@id":"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/thefundmentor.com\/72431189-29bf-46f6-9a48-9c57296e9cae\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thefundmentor.com\/"},{"@type":"ListItem","position":2,"name":"Consultant Cybers\u00e9curit\u00e9 N2 SOC : Automatisation et Analyse des Incidents"}]},{"@type":"WebSite","@id":"https:\/\/thefundmentor.com\/#website","url":"https:\/\/thefundmentor.com\/","name":"The Fund Mentor","description":"","publisher":{"@id":"https:\/\/thefundmentor.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thefundmentor.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/thefundmentor.com\/#organization","name":"The Fund Mentor","url":"https:\/\/thefundmentor.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/thefundmentor.com\/#\/schema\/logo\/image\/","url":"https:\/\/thefundmentor.com\/wp-content\/uploads\/sites\/506\/2025\/11\/Logo-The-Fund-Mentor.png","contentUrl":"https:\/\/thefundmentor.com\/wp-content\/uploads\/sites\/506\/2025\/11\/Logo-The-Fund-Mentor.png","width":600,"height":600,"caption":"The Fund Mentor"},"image":{"@id":"https:\/\/thefundmentor.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/thefundmentor.com\/#\/schema\/person\/d52888235fd6563bd07d97185d6a61e4","name":"Bruno Gianni","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/thefundmentor.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0f5d42d7bf77874643c1478932860e3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0f5d42d7bf77874643c1478932860e3f?s=96&d=mm&r=g","caption":"Bruno Gianni"},"description":"Bruno writes the way he lives, with curiosity, care, and respect for people. He likes to observe, listen, and try to understand what is happening on the other side before putting any words on the page.For him, writing is not about impressing, but about getting closer. It is about turning thoughts into something simple, clear, and real. Every text is an ongoing conversation, created with care and honesty, with the sincere intention of touching someone, somewhere along the way.","url":"https:\/\/thefundmentor.com\/it\/author\/bcgianni\/"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"Bruno Gianni","author_link":"https:\/\/thefundmentor.com\/it\/author\/bcgianni\/"},"uagb_comment_info":0,"uagb_excerpt":"D\u00e9couvrez une mission de consultant SOC N2 freelance : analyse incidents de s\u00e9curit\u00e9, automatisation, gestion vuln\u00e9rabilit\u00e9s. Profitez d'un environnement d'experts et du t\u00e9l\u00e9travail flexible.","_links":{"self":[{"href":"https:\/\/thefundmentor.com\/it\/wp-json\/wp\/v2\/posts\/20656"}],"collection":[{"href":"https:\/\/thefundmentor.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thefundmentor.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thefundmentor.com\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/thefundmentor.com\/it\/wp-json\/wp\/v2\/comments?post=20656"}],"version-history":[{"count":1,"href":"https:\/\/thefundmentor.com\/it\/wp-json\/wp\/v2\/posts\/20656\/revisions"}],"predecessor-version":[{"id":20665,"href":"https:\/\/thefundmentor.com\/it\/wp-json\/wp\/v2\/posts\/20656\/revisions\/20665"}],"wp:attachment":[{"href":"https:\/\/thefundmentor.com\/it\/wp-json\/wp\/v2\/media?parent=20656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thefundmentor.com\/it\/wp-json\/wp\/v2\/categories?post=20656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thefundmentor.com\/it\/wp-json\/wp\/v2\/tags?post=20656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}