Senior Information Security Operations Center Analyst

Ryder Supply Chain SolutionsCoral Gables, FL
1d

About The Position

The Senior Security Operations Center Analyst will be responsible for planning and implementing security measures to protect computer systems, networks, and data. This person will handle higher level security investigations and incidents. The Senior Security Operations Center Analyst will monitor network traffic for security events and perform triage analysis to identify security incidents. The Senior Security Operations Center Analyst will receive Incidents and performs deep analysis; correlates with threat intelligence to identify the threat actor, nature of the attack and systems or data affected. Defines and executes on strategy for containment, remediation, and recovery The Senior Security Operations Center Analyst will deliver cyber intelligence services and material to information technology and business leaders. Identify new threat tactics, techniques and procedures used by cyber threat actors. Publish actionable threat intelligence for business and technology management.

Requirements

  • Ability to lead and persuade individuals and small teams on ideas, concepts and opportunities
  • Critical thinking and problem solving skills
  • Demonstrated proficiency in basic computer applications, such as Microsoft Office software products
  • Ability to effectively communicate business risk as it relates to information security
  • Expertise in incident response and system monitoring and analysis
  • Knowledge of the incident handling procedures and intrusion analysis models, advanced required
  • Foundational knowledge of processes, procedures and methods to research, analyze and disseminate threat intelligence information, advanced required
  • Demonstrated advanced knowledge of cyber security operations with a focus area in two or more of the following: Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider) vulnerabilities, and exploits; incident response, investigations and remediation, advanced required
  • Broad knowledge of general IT with a focus area in two or more of the following areas: operating systems, networking, computer programing, web development or database administration, advanced required
  • Bachelor's degree required in Information Assurance, Computer Science, Engineering, or related technical field.
  • Three (3) years or more experience in information security administration, offensive tactics, monitoring, and IR. required
  • Three (3) years or more experience related security systems administration with endpoint, network, application, and host-based security solutions. required
  • Knowledge of the incident handling procedures and intrusion analysis models. advanced required
  • Foundational knowledge of processes, procedures and methods to research, analyze and disseminate threat intelligence information. advanced required
  • Demonstrated advanced knowledge of cyber security operations with a focus area in two or more of the following: Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider) vulnerabilities, and exploits; incident response, investigations and remediation. advanced required
  • Broad knowledge of general IT with a focus area in two or more of the following areas: operating systems, networking, computer programing, web development or database administration. advanced required

Nice To Haves

  • Two (2) years or more Cloud computing (e.g., Amazon Web Services, Google Cloud Platform or Microsoft Azure) security configuration and management experience preferred.
  • Risk, Privacy, or Security Certification (CISSP, CCSK, CCSP, PCSM)

Responsibilities

  • Participate in threat hunting activities to proactively search for threats in the enterprise environment.
  • Participate in the creation and maintenance of use cases for recurring investigation/incident triggers in support of the 24/7 Cyber Threat Operations and Cyber Threat Management program.
  • Participate in the creation and maintenance of playbooks used in response for investigation/incident triggers in support of 24/7 Cyber Threat Operations and Cyber Threat Management program.
  • Act as coordinator in the event of escalated cyber threats/incidents for Tier 1 analysts.
  • Assist in escalated computer security incidents and cyber investigations including computer forensics, network forensics, root cause analysis and malware analysis.
  • Interface with other teams in Information Security (e.g., EIS Engineering, Security Architecture, GRC) along with information and liability risk officers and technology management to help guide cyber security strategy.
  • Work with team members to enhance and enrich security monitoring tools with contextual information.
  • Provide mentoring for junior level analysts.
  • Adhere to all policies and standards, as well as regulatory requirements regarding reporting and escalations.
  • Publish actionable threat intelligence for business and technology management.
  • Identify new threat tactics, techniques and procedures used by cyber threat actors.
  • Performs other duties as assigned.

Benefits

  • Ryder offers comprehensive health and welfare benefits, to include medical, prescription, dental, vision, life insurance and disability insurance options, as well as paid time off for vacation, illness, bereavement, family and parental leave, and a tax-advantaged 401(k) retirement savings plan.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service