Perform cybersecurity threat detection, assessment, and mitigation efforts as part of a 24/7 global team
Investigate potential cybersecurity events across multiple environments using various tools and techniques
Support inquiries from compliance teams such as IT risk management and internal and external auditors to ensure documentation is complete and processes are in compliance with information security policies
Create reports analyzing activities or trends both within and outside of the organization
Perform threat hunting across the environment to attempt to detect any adversary activity
Support the development of security operations detections, playbooks, and automations to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
Reviews internal logs and alerts to identify potential cybersecurity events. Triage cases based on output from automated alerts, and determine when to escalate to other teams
Monitors external service provider activity to detect potential cybersecurity events
Analyzes security data from all systems in real time to spot and thwart potential threats, attacks, and other violations
Analyzes compromised systems and remediates to a clean state
Performs breach indicator assessments to investigate network traffic for malicious activity
Assists with internal or third-party employee investigations
Assists in the production of various reports which identify and analyze relevant upcoming and ongoing threats to the enterprise
Research evolving threats, techniques, tools, and vulnerabilities in support of information security efforts
Stays current with information security program developments, industry frameworks, changes in the company, industry trends, and current security practices
Requirements
Bachelor’s degree in Information Technology, Cyber Security, Computer Science, or related discipline or equivalent work experience
1 + years of experience working in the cybersecurity or related field
Relevant technical and industry certifications, such as those provided by GIAC, EC-Council, ISC2, and CompTIA are preferred
Experience in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics preferred
Experience with information security risk management, including information security audits, reviews, and risk assessments
Tech Stack
Cyber Security
Benefits
Comprehensive health and wellness benefits
Retirement plans
Educational assistance and training programs
Income replacement for qualified employees with disabilities