Technical Analyst

Munich Re GroupNashville, TN
80d

About The Position

We're adding to our diverse team of experts and are looking to hire those who are committed to building a culture that enables the creation of innovative solutions for our business units and clients. We will consider a range of experience for this role and the offer will be commensurate with that. As a member of Munich Re's US operations, we offer the financial strength and stability that comes with being part of the world's preeminent insurance and reinsurance brand. Our risk experts work together to assemble the right mix of products and services to help our clients stay competitive - from traditional reinsurance coverages, to niche and specialty reinsurance and insurance products. The Security Operations Center (SOC) enhances Munich Re's and ERGO's cybersecurity posture by providing a centralized monitoring, detecting, responding to, and managing security incidents and threats. It serves as the backbone of the cybersecurity strategy, aiming to proactively defend against threats and respond effectively to incidents to safeguard Munich Re's and ERGO's information and reputation.

Requirements

  • At least 2 years of working experience in a SOC or CSIRT/CERT
  • Strong knowledge about (latest) security threats
  • Broad experience in network infrastructure e.g. firewalls, IDS/IPS systems
  • Knowledge of Internet technologies, Server, desktop, and mobile OS
  • Ability to work according to compliance standards in a confidential environment
  • Ability to explain complex technical matters in easy wording
  • Flexible, creative, good team player with 'can-do' attitude
  • Strong analytical skills
  • Strong communications skills
  • Willingness for permanent learning/self-education
  • Willingness for on-call shifts

Responsibilities

  • Processing security incidents that have already been pre-qualified in level 1 SOC analysis based on playbooks that are created and maintained in SIEM engineering
  • Documenting the incident
  • Transferring the incident to the appropriate party (e.g. CSIRT) and supporting them in the further analysis and processing of that security incident if the incident cannot be resolved in Level 2
  • Documenting improvement potential per incident and implementation of lessons learned
  • Creating and maintaining standards for internal procedures governing the day-to-day work of the team
  • Contributing to regular feedback workshops with SIEM Engineering, Level-1, and CSIRT to optimize the procedures and the tools used, such as run books
  • Defining configuration standards for hardening of systems
  • Supporting SIEM Use Case Development - Collaboration in the creation, maintenance, and optimization of the rules and regulations and the instructions for the processing of incidents
  • Carrying out operational activities ordered by the IT Security Manager
  • Taking over the on-call duty

Benefits

  • Diversity and Inclusion initiatives
  • Equal opportunity employer
  • Reasonable accommodations for individuals with disabilities
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service