- Research emerging threats and vulnerabilities to aid in identifying network incidents and support the creation of architecture, policies, and standards to address them.
- Provide incident response support, including containment actions and facilitating forensic analysis when required.
- Support the creation and execution of business continuity and disaster recovery plans, including conducting tests, publishing results, and addressing deficiencies.
- Conduct network monitoring and intrusion detection analysis using tools such as IDS/IPS, firewalls, and host-based security systems (HBSS).
- Analyze and document data from alerts and sensors, creating formal technical incident reports.
- Test new hardware, software, switches, and routers before deployment to ensure security compliance.
- Perform log-based and endpoint-based threat detection to protect against multi-source threats.
- Deploy and manage cloud-centric detection mechanisms to identify threats in cloud environments and services.
- Correlate activity across assets (endpoints, networks, and applications) and environments (on-premises and cloud) to detect patterns of anomalous activity.
- Collaborate with threat intelligence and threat-hunting teams to enhance detection and response capabilities.
- Develop and maintain a deep understanding of organizational goals and align security initiatives accordingly.
- Education: Bachelor’s degree in computer science, engineering, information systems, or a related field strongly preferred.
- Experience: Minimum of 5+ years of experience in information security, with a focus on network security analysis.
- Expertise in analyzing threat data, evaluating malicious activity, and identifying attacker tactics, techniques, and procedures (TTPs).
- Proficiency with network defense tools, including IDS/IPS, firewalls, and endpoint security solutions.
- Strong understanding of log and endpoint-based threat detection methodologies.
- Ability to document and communicate technical incident reports clearly and effectively.
- Ability to articulate complex security concepts to both technical and non-technical audiences.
- Proficient in solving complex business problems creatively and analytically.
- Capability to estimate financial impacts and propose cost-effective security solutions.
- Proven ability to work collaboratively with cross-functional teams in diverse scenarios.
- Self-motivated with a strong sense of urgency and integrity.
#LI-JC2