Security Services Analyst

Full Job Description
Are you enthusiastic about solving problems in the threat detection and security response space? Are you interested in challenges within Cloud Computing space? Does protecting over 1 billion customers and making the cyber world a better place for everyone sound exciting? If so, this may be an ideal opportunity for you.
The core responsibility is to perform triage, analysis, and investigations in response to security alerts, which includes analysis, digital forensics and data analytics. In addition to identifying trends to assist other orgs with remediation of possible security issues within a product or service. Your passion for finding creative approaches for security problems will shine as you gather evidence and build a picture about what transpired during your investigations. You will be responsible for fusing multiple sources of evidence to determine how a security incident occurred and what steps need to transpire to remediate it. You will also be responsible for building capabilities that close information gaps, strengthen our cloud defenses and defend customers from emerging security threats. The SOC is a fast-paced team that constantly provides new opportunities to learn and grow. This role may include the need to work outside of core hours on high priority investigations and will include on-call responsibilities.

Responsibilities
Responsibilities:
  • Prioritize alerts and issues and perform triage to confirm security incidents.
  • Performing analysis on true positive alerts to determine root cause and impact.
  • Collaborate with teams to create and potentially execute incident mitigation and remediation plans.
  • Evaluate security risks and their impact to the Cloud platform and its online services.
  • Create technical documentation for other analysts and other teams to follow.
  • Support cross company incidents and crisis.
  • Conduct analysis of detections and provide feedback to detection authors.
  • Communicate with internal and external customers as needed.
  • Document detailed work notes in case tracking system.
Working Patterns:
  • Work hours: 40 hours per week minimum
  • Shift work: Weekend and Holiday work will be required, conducted on a rotational basis

Qualifications
Required Qualifications:
  • Bachelor’s degree or equivalent cyber security training
  • Experience in a technical support/helpdesk environment.
  • Trained in latest Cyber Security threat vectors
  • Trained in managing security incidents that involve privacy
Preferred Qualifications:
  • Has solid experience or training in working in a Security Operation Center
  • Has previous experience or training in performing Digital Forensics and Incident Response.
  • A degree in an applicable subject, such as; Cyber Security or Computer Science. Cyber security training will be accepted in lieu of degree
  • Trained in responding to, investigating, and recovering from compromise and data breach events.
We are an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request via the Accommodation request form.
Benefits/perks listed below may vary depending on the nature of your employment and the city where you work.

To apply for this job email your details to recruit@cysecon.com

error

Care to Share? Please spread the word :)