Required Information Security Analyst.
Required Travel- Up to 25%.
Managerial – No.
Location: :RAANANA (company site).
Who are we?
Our company helps those who build the future to make it amazing.
With our market-leading portfolio of software products and services, we unlock our customers innovative potential, empowering them to provide next-generation communication and media experiences for both the individual end user and enterprise customers.
Our approximately 30,000 employees around the globe are here to accelerate service providers migration to the cloud, enable them to differentiate in the 5G era, and digitalize and automate their operations. Listed on the NASDAQ Global Select Market, our company had revenue of $4.89 billion in fiscal 2023.
In one sentence- secures enterprise information by developing, implementing, and enforcing security controls, safeguards, policies, and procedures.
What will your job look like?
– Responsible to work as T2/L2 in a 24×7 security operations center (SOC) environment.
– Monitoring and analysis of Cyber security events with use of ArcSight(SIEM), Splunk and SOAR.
– Candidate should be able to understand, evaluate, and respond to security incidents.
– Recognize potential, successful, and unsuccessful intrusion attempts/compromises through review and analysis of relevant event details and summary information.
– Responsible to work as security incident responder and threat hunter.
– Responsible to do Malware Analysis.
– Development and execution of SOC procedures.
– Triage security events and incidents, detect anomalies and report/direct remediation actions.
– Ensure confidentiality and protection of sensitive data.
– Working with remediation(IT infra&Ops) teams on incident mitigation.
– Follow up on remediation activities.
Why you will love this job:
You will be able to demonstrates an understanding of key business drivers and ensures strategic directions are followed and the organization succeeds.
You will be able to gathers relevant data, identifies trends and root causes, and draws logical conclusions to develop solutions.
You will have ability to assess details, systems and other factors as part of a single and comprehensive picture.
We are a dynamic, multi-cultural organization that constantly innovates and empowers our employees to grow.
Our people our passionate, daring, and phenomenal teammates that stand by each other with a dedication to creating a diverse, inclusive workplace!
We offer a wide range of stellar benefits including health, dental, vision, and life insurance as well as paid time off, sick time, and parental leave.
Required Travel- Up to 25%.
Managerial – No.
Location: :RAANANA (company site).
Who are we?
Our company helps those who build the future to make it amazing.
With our market-leading portfolio of software products and services, we unlock our customers innovative potential, empowering them to provide next-generation communication and media experiences for both the individual end user and enterprise customers.
Our approximately 30,000 employees around the globe are here to accelerate service providers migration to the cloud, enable them to differentiate in the 5G era, and digitalize and automate their operations. Listed on the NASDAQ Global Select Market, our company had revenue of $4.89 billion in fiscal 2023.
In one sentence- secures enterprise information by developing, implementing, and enforcing security controls, safeguards, policies, and procedures.
What will your job look like?
– Responsible to work as T2/L2 in a 24×7 security operations center (SOC) environment.
– Monitoring and analysis of Cyber security events with use of ArcSight(SIEM), Splunk and SOAR.
– Candidate should be able to understand, evaluate, and respond to security incidents.
– Recognize potential, successful, and unsuccessful intrusion attempts/compromises through review and analysis of relevant event details and summary information.
– Responsible to work as security incident responder and threat hunter.
– Responsible to do Malware Analysis.
– Development and execution of SOC procedures.
– Triage security events and incidents, detect anomalies and report/direct remediation actions.
– Ensure confidentiality and protection of sensitive data.
– Working with remediation(IT infra&Ops) teams on incident mitigation.
– Follow up on remediation activities.
Why you will love this job:
You will be able to demonstrates an understanding of key business drivers and ensures strategic directions are followed and the organization succeeds.
You will be able to gathers relevant data, identifies trends and root causes, and draws logical conclusions to develop solutions.
You will have ability to assess details, systems and other factors as part of a single and comprehensive picture.
We are a dynamic, multi-cultural organization that constantly innovates and empowers our employees to grow.
Our people our passionate, daring, and phenomenal teammates that stand by each other with a dedication to creating a diverse, inclusive workplace!
We offer a wide range of stellar benefits including health, dental, vision, and life insurance as well as paid time off, sick time, and parental leave.
Requirements:
All you need is:
– Bachelor degree in engineering or equivalent.
– Relevant work experience of 6+ years.
– Certification in CISSP/CEH preferable.
– Experience in-depth alert Analysis and Incident response.
– Proven knowledge of information security concepts and methodologies.
– Must have cybersecurity incident discovery and event management, network forensics, IPS/IDS, firewalls, content filtering technology, DLP, configuration management and monitoring, endpoint protection, database security and log analysis understanding.
– Experience and keen understanding of cybersecurity tools, including SIEM, IDS/IPS, antivirus and EDR solutions.
– Relevant work experience in incident response and threat hunting.
– Relevant work experience in malware analysis.
– Experience in developing and maintaining Play/Run Books and/or Standard operating procedures in a SOC environment.
– Team player with the ability to work autonomously.
Nice to have skills:
– Involvement in threat intelligence and cybersecurity communities.
– Strong troubleshooting, reasoning, and analytical problem-solving skills.
All you need is:
– Bachelor degree in engineering or equivalent.
– Relevant work experience of 6+ years.
– Certification in CISSP/CEH preferable.
– Experience in-depth alert Analysis and Incident response.
– Proven knowledge of information security concepts and methodologies.
– Must have cybersecurity incident discovery and event management, network forensics, IPS/IDS, firewalls, content filtering technology, DLP, configuration management and monitoring, endpoint protection, database security and log analysis understanding.
– Experience and keen understanding of cybersecurity tools, including SIEM, IDS/IPS, antivirus and EDR solutions.
– Relevant work experience in incident response and threat hunting.
– Relevant work experience in malware analysis.
– Experience in developing and maintaining Play/Run Books and/or Standard operating procedures in a SOC environment.
– Team player with the ability to work autonomously.
Nice to have skills:
– Involvement in threat intelligence and cybersecurity communities.
– Strong troubleshooting, reasoning, and analytical problem-solving skills.
This position is open to all candidates.