Cybersecurity Analyst
at Dell
București, Municipiul București, Romania -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 10 Feb, 2025 | Not Specified | 11 Nov, 2024 | N/A | Network Security,Completion,Windows,Icmp,Confidentiality,Linux,Rest,Security Controls,Json,Operating Systems,Mac Os,Communication Skills,Decision Making,Information Security,Indicators,Ldap,Ssh,Computer Science | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
We enjoy competitive compensation and benefits packages, and reward and recognize our employees for exceptional results. A constant focus on continued learning and growth keeps our team members engaged and excited about “what’s next.” We offer flexible work options when available, and emphasize the importance of work-life balance. We know that when our people are rewarded, recognized, and rejuvenated, we win as a team.
EXPERIENCE, SKILLS AND ABILITIES
- Significant experience with and expert understanding of:Two (2) or more of the following operating systems (Windows, Linux, Mac OS) at a filesystem levelFundamental Internet protocols, services and technologies (e.g. HTTP/HTTPS, DNS, SMTP, SSH, LDAP, TCP/IP, UDP, ICMP, JSON, REST, etc.)Common security controls (e.g. firewalls, proxies, IDS/IPS, WAF, etc.)
- Experience with and strong understanding of:Performing both endpoint and network-based investigationsReviewing logs to identify evidence of past intrusionsPivot off indicators within networks to identify the scope and breadth of attacksMalware and exploit kit functionalityOperating system and application exploitsLateral movement, living-off-the-land, and persistence establishment mechanismsDetection of anomalous system activityThreat hunting methodologiesIncident response and incident handling processes
- Skills and/or abilities required to perform the essential functions of the jobAbility to research and characterize security threats including creating appropriate countermeasuresAbility to write scripts to automate new and existing tasksStrong technical communication skills, both written and verbalAttention to detail and great organizational and time management skillsExcellent problem solving skills that would allow for the ability to diagnose and troubleshoot technical issuesClient-focused with a passion for delivering service excellenceCourage and willingness to challenge conventional wisdomGreat leadership and coaching skillsCommunication - The ability to make himself well understood by others through the capacity to clearly and convincing express his point of view, to actively listen and control the conversation flow)Risk assessment and decision making -The ability to analyze within reason facts and situations, decision making, evaluating consequences of others and undertake acceptable risksInfluencing - the ability to convince others of his opinions and determine them to followTask management and planning - The ability to effectively set an adequate action plan for himself/herself and for others, in order to reach a goalStrong sense of urgency and ability to work under pressurePossess high standard of integrity and confidentiality
EDUCATION/EXPERIENCE
- 5 + years of relevant experience or equivalent combination of education and work experience:Completion of a Bachelor’s degree or equivalent program in Computer Science, Network Security, Information Security or other applicable field and 5+ years of work experience in the field
Responsibilities:
ROLE OVERVIEW
Be part of an exciting team that deals with bleeding-edge information security attacks, malware infections, and incident response situations on a daily basis. Protecting our clients from threat actors attempting to compromise their environments.
Working as a Senior Advisor in a security operations center environment with other security and networking professionals, you will extend your currently existing network and endpoint security investigation analysis skillset through identification, assessment, review and authoring of incident reports in a variety of client environments. You will actively investigate threat actor activity, malware infections, living off the land attacks, as well as a variety of other security incidents and provide clients with the impact of the threat, your assessment of the incident, as well as recommendations.
ROLE RESPONSIBILITIES
- Review security-related events and assess their risk and validity based on available telemetry from network, endpoint, and global threat intelligence information in order to provide clients with concise, detailed, and well-written incident reports, root causes identification, and remediation recommendations
- Provide customers with understandable context around their security environment and threats
- Interface with clients to address their issues, concerns, and questions, and drive to satisfactory closure any issues that impact the service and its value
- Work with client and internal Secureworks incident response teams to resolve ongoing intrusions, malware outbreaks, and other security incidents
- Provide mentorship to Secureworks team members and clients on security strategy, tactics, techniques, and procedures
- Use the Secureworks platform to proactively hunt for and investigate activity within the client environment
- Use experience gained during incident investigations as well as malware and exploit analysis to contribute to the development of indicators of compromise
- Act as first point of coordination for escalations coming on shift directly from customers via chat, tickets, investigations, (with support from manager)
- Act as shift coordinator by prioritizing the tasks, activities, internal and external client’s requests
- Provide support for all other teams involved in the delivery of the service whenever they have questions or requests from customers.
- Collect and validate flows/processes/tools issues reported by his shift and present them to the manager
- Involve in technical assessments, coaching and/or development of training programs for the team members
- Tracking and reporting of KPIs
REQUIREMENT SUMMARY
Min:N/AMax:5.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Other
Graduate
The field
Proficient
1
București, Romania