Key Responsibilities
· As an active member of the team, monitor and process response for security events on a 24x7 basis. Regular day shift, on-call off shift rotation.
· Coordinate Postmortem exercises post incidents with a focus to identify deficiencies requiring additional attention.
· Respond, triage, and escalate security incidents as necessary.
· Respond, triage, and escalate vulnerabilities as necessary.
· Coordinate remediation activities for Zero days/High Severity vulnerabilities.
· Leverage automation and orchestration solutions to automate repetitive tasks.
· Work alongside other security team members to hunt for and identify security issues generated from the network, including third-party relationships.
· Coordinate incident response activities across multiple independently managed environments and security teams.
· Leverage knowledge in multiple security disciplines, such as Windows, Unix, Linux, data loss prevention (DLP), endpoint controls, Public Cloud, and networking, to offer global solutions for a complex heterogeneous environment.
· Utilize multiple security/threat intelligence tools and resources to understand threats.
· Analyze and respond to minor and major incidents, reported SPAM and Phishing e-mails.
· Partner with the detection engineering team to improve tool usage and workflow, as well as with the advanced threats and assessment team to mature monitoring and response capabilities.
· Support 24/7 operations as needed.
· Perform other duties as assigned.
Skills and Qualifications
· General knowledge of network, backend systems, operating systems, applications, and web services in a manner that allows for the interaction of all as it relates to security and services.
· Ability to apply analytical knowledge and critical thinking to security incidents and vulnerabilities.
· Ability to assimilate, understand and utilize various security technologies.
· Ability to collaborate within a geographically distributed team of Incident Response Analysts and vulnerability remediation team.
· Knowledge of relevant information security and incident response frameworks such as MITRE ATT&CK Framework and CVSS scoring systems.
· Solid communication skills and ability to work in a collaborative atmosphere.
· Attention to detail in creating reports for team members and leadership.
· Ability and willingness to learn new tools and processes.
· Knowledge of Crowdstrike desired by not required.
· Relevant security certifications are a plus
Any Gradute