This posting has been closed |
You are strategic and understand business operations, information technology, and security and will utilize that knowledge to assist with the implementation of an effective security campaign that ensures the overall security position of the company is aligned with business needs and the evolving threat landscape. You will primarily be exposed to a variety of information gathered from throughout the company infrastructure and will work to understand the data and derive threat-driven detection and prevention use-cases.
You will be required to understand potential infection vectors, analysis of threat behavior and kill-chains stages, and the derivation and improvement of methods for detecting malicious or insider threat activity.
What We Offer You:
- Competitive health and wellness benefits, empowering you to value life in and out of the office
- Active engagement with the local community through the company’s specialized employee groups
- An environment that encourages networking and collaboration across functions and businesses
Your Key Responsibilities:
- Assess IT and security-based computer and network logs for the purpose of identifying specific patterns of activity or generating statistical summaries
- Produce analyses and actionable reports on new and potentially identified threats for the purposes of accurate mitigation and further detection
- Develop and maintain behavioral- and signature-based threat-driven use-cases
- Documentation of processes and procedures developed by cyber threat analytics
- Support CSO teams with the analysis of complex security alerts and network traffic to determine the existence or extent of potential threats
- Assess events based on facts immediately present, available external context and analysis, and wider knowledge and experience with IT systems
Your Skills and Experience:
- Experience working in information security or IT operations related field in an enterprise environment with experience in comprehensive vulnerability management programs
- Ability to collect, process, and analyze data and information to create threat intelligence indicators
- Experience creating cyber content and provide cyber analytics
- Experience with Splunk or other database query languages (i.e. SQL)
- Experience with basic data and network analysis tools (i.e. Wireshark)
- Experience working in a security operations center (SOC) or computer emergency response team (CERT/CIRT)