Caterpillar-posted 1 day ago
Full-time • Entry Level
East Peoria, IL
5,001-10,000 employees

When you join Caterpillar, you're joining a global team who cares not just about the work we do – but also about each other. We are the makers, problem solvers, and future world builders who are creating stronger, more sustainable communities. We don't just talk about progress and innovation here – we make it happen, with our customers, where we work and live. Together, we are building a better world, so we can all enjoy living in it. Security Operations Center Analyst The SOC (Security Operations Center) is a critical component of CSIRT (Cyber Security Incident Response Team). Analysts on the SOC are responsible for the continuous monitoring and response to security alerts and events that occur within Caterpillar’s global network. This includes investigating Malware alerts, Phishing emails, anomalous activity, and anomalous network traffic. The SOC also takes necessary action to remediate these events.

  • Monitor security information and event management (SIEM) systems for security alerts.
  • Investigate alerts with various security tools.
  • Analyze and triage security alerts, escalating, as necessary.
  • Collaborate with IT and cybersecurity teams to contain and remediate threats.
  • Monitor the Phishing inbox, investigate and respond to all reported emails.
  • Inspect file attachments and links for potential malware.
  • Investigate network alerts through the IDS tool.
  • Ensure accurate case notes are recorded.
  • Document incident findings, actions taken, and lessons learned.
  • SOC or equivalent experience.
  • Experience within IT (Information Technology).
  • Experience with SIEM or similar solutions (splunk, logscale, etc...).
  • Some proficiency in PowerShell, Python, SQL.
  • Proven critical thinking skills and ability to solve problems.
  • Proven ability to learn new tools, processes, and technical concepts quickly.
  • Knowledge of Incident handling, MITRE attack framework, and Cyber Security Kill Chain.
  • Understanding of Windows Authentication protocols, network technologies, Explicit Proxy, IDS, EDR, UEBA, and Sandboxing.
  • Experience with Cybersecurity report writing.
  • Understanding of or experience in penetration testing.
  • Cybersecurity Standards and Policies: Knowledge of developing cybersecurity policies, standards, and procedures; ability to develop and communicate policies, standards and procedures that guide interactions with customers.
  • Endpoint Security: Knowledge of the tools and processes for maintaining endpoint security; ability to design and implement security programs to prevent data loss and access intrusion from external sources. Strong experience in Enterprise Tool Support (AV, EDR, Vulnerability Scanner, SCCM, etc)
  • Information Security Technologies: Knowledge of technologies and technology-based solutions dealing with information security issues; ability to protect information security across the organization using encryption technologies and appropriate security software.
  • Information Technology (IT) Security Policies: Knowledge of IT security policies, standards, and procedures; ability to utilize a variety of administrative skill sets and technical knowledge to ensure cyber security compliance.
  • Requirements Analysis: Knowledge of tools, methods, and techniques of requirement analysis; ability to elicit, analyze and record required business functionality and non-functionality requirements to ensure the success of a system or software development project.
  • System and Technology Integration: Knowledge of the features and facilities of systems; ability to integrate and communicate among applications, databases, and technology platforms.
  • Technical Writing/Documentation: Knowledge of technical writing; ability to write technical documents such as manuals, reports, guidelines or documents on standards, processes, and applications.
  • Cyber Security: Knowledge of antivirus/malware attacks and the defenses used; ability to defend and prevent electronic threats, theft, and attacks.
  • Bachelor’s degree in a relevant field or equivalent experience.
  • Certifications (CompTIA Security+, GSEC, etc...) preferred.
  • Medical, dental, and vision benefits
  • Paid time off plan (Vacation, Holidays, Volunteer, etc.)
  • 401(k) savings plans
  • Health Savings Account (HSA)
  • Flexible Spending Accounts (FSAs)
  • Health Lifestyle Programs
  • Employee Assistance Program
  • Voluntary Benefits and Employee Discounts
  • Career Development
  • Incentive bonus
  • Disability benefits
  • Life Insurance
  • Parental leave
  • Adoption benefits
  • Tuition Reimbursement
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service