Detection and Response Analyst

Work set-up: 
Full Remote
Contract: 
Experience: 
Mid-level (2-5 years)
Work from: 

Offer summary

Qualifications:

Minimum of 3 years cybersecurity experience in incident detection and response., Bachelor's degree in Computer Science, Information Security, or related field, or equivalent work experience., Proficiency with enterprise security technologies such as SIEM, intrusion prevention, and endpoint detection tools., Relevant security certifications like Security+, CYSA+, GCIH, or GCFA..

Key responsibilities:

  • Monitor and respond to security alerts in a 24/7 Cyber Fusion Center.
  • Conduct in-depth analysis of security events and perform threat hunting activities.
  • Support incident response efforts, including containment and remediation of threats.
  • Create documentation and playbooks to standardize security processes.

Toyota Tsusho Systems US, Inc. logo
Toyota Tsusho Systems US, Inc. Computer Hardware & Networking SME https://www.ttsystems.com/
51 - 200 Employees
See all jobs

Job description

As part of the Incident Detection team, Detection and Response Analyst will play an essential role in supporting our 247 Cyber Fusion Center, monitoring and responding to alerts to help prevent and mitigate cyberattacks. Detection and Response Analyst conducts indepth analysis of security events and requires the ability to identify indicators of compromise (IOCs), perform intrusion and root cause analysis, and proactively take actions to mitigate potential damage to our cyber ecosystem.

Essential Functions:

• Work in 24x7 Cyber Fusion Center to provide monitoring and detectionresponse services. Work various 10hour shifts, including weekends and work both day and night shifts. Shifts rotate quarterly.

• Leverage SIEM to query logs and correlate across multiple log sources.

• Detect and respond to security incidents by leveraging detectionresponse platforms.

• Triage security incidents and perform indepth analysis using cyber threat intelligence, intrusion detection systems, firewalls and other boundary protection devices.

• Escalates cybersecurity events according to playbooks and standard operation procedures (SOPs).

• Support Incident Response efforts as needed, including providing counsel, working with the IR team, as well as other involved stakeholders within the organization and customers to drive forward remediation activities.

• Assist with containment and remediation of threats during incidents. Use internal ticketing system to track investigated incidents and capture relevant details.

• Conduct threat hunting activities based on internal and external threat intelligence.

• Assist with service requests from customers and internal teams.

• Identify, recommend, coordinate, and deliver timely knowledge to support teams.

• Report all information to the supervisor and upper management with updates as requested and respond to requests for information and assistance, including project progress and problems, particularly as needed to change in schedule, resources and scopes

• Contribute to the creation of documentation to standardize processes and procedures, including playbooks to improve internal processes and procedures.

• Work with team to establish repeatable and constantly improving processes.

• Serve as mentor and provide training to other team members as needed.

• Other tasks and responsibilities as assigned by leadership.

Requirements

Required Education and Experience:

• At least 3 years of cybersecurity experience with a focus on Incident Detection, Incident Response andor Security Operations.

• BABS in Computer Science, Information Security, or Information Systems or equivalent related work experience.

• Experience interfacing with internal and external customers, providing remediation actions to nontechnical audiences.

• Working knowledge of enterpriselevel security technologies such as SIEM and ticketing systems.

• Experience in a highly collaborative environment with a focus on project delivery and desired business outcomes.

• Experience with SIEM platforms, enterprise intrusion prevention systems, endpoint detection and response tools, and other security products.

• Experience supporting large scale incident investigations.

• Experience interfacing with a variety of cybersecurity teams (such as red team, cyber threat intelligence, data loss prevention, etc).

• Security certifications such as: Security+, CYSA+, CASP+, GCFA, GCIH, GCFE

Competencies:

• Strong technical background in security, network, infrastructure, cloud, applications.

• Knowledge of risk assessment tools, technologies, and methods.

• Firm grasp of networking and hacking concepts.

• Expertise in designing secure networks, systems, and application architectures.

• Knowledge around common web application attacks including SQL injection, crosssite scripting, invalid inputs, and forceful browsing.

• Proficient knowledge of how common protocols & applications work at the network level, including DNS, HTTP, and SMB.

• Proficient with SIEM technologies (Security Information and Event Management e.g., SplunkMS sentinel or other SIEM TOOL).

• Detailorientated and analytical skills.

• Problemsolving skills

• Proficient with Microsoft Office & documentation skills (Word, Excel, PowerPoint)

Required profile

Experience

Level of experience: Mid-level (2-5 years)
Industry :
Computer Hardware & Networking
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Incident Reporting
  • Collaboration
  • Analytical Skills
  • Detail Oriented
  • Communication
  • Problem Solving

Related jobs