Sr. Cyber Security Analyst at Leggett Platt
Remote, Oregon, USA -
Full Time


Start Date

Immediate

Expiry Date

04 Nov, 25

Salary

0.0

Posted On

06 Aug, 25

Experience

3 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Good communication skills

Industry

Information Technology/IT

Description

We, at Leggett & Platt Inc., are searching for a Sr. Cyber Security Analyst within our Corporate IT team to help support our business. As a global-diversified manufacturing company, it’s sometimes hard to explain all the different things we do. We like to say, “we’re the biggest company no one has ever heard of.” We are confident you interact with one of our products in your daily life without knowing it. Whether it’s the mattress you sleep on, the car you drive, the plane you fly on, or the furniture you sit on, our high-quality components are there supporting you. If you join our team, your work will ensure people across the world have a little more comfort in their lives.
As a Sr. Cyber Security Analyst, you will report to and partner with the Sr. Manager, Cyber Security Operations and be part of a high-performing team that will consist of a Security Operation Center (SOC) and Security Analyst. This role will monitor and respond to alters and threats throughout the company regarding IT and Manufacturing technology.
The Sr. Cyber Security Analyst will have vast technical expertise and experience in security operations, security incident response, and digital forensics (DFIR). They will have significant experience in configuring and using cyber security tools such as SIEM, EDR, SOAR, and Vulnerability Management platforms. This person will draft SOP’s and playbooks and be part of a high performing team that works to continually mature the SOC and improve operational excellence.

Responsibilities

SO, WHAT WILL YOU BE DOING AS A SR. CYBER SECURITY ANALYST?

  • Support the cyber security incident response process from detection and containment through the forensic investigation and remediation
  • Identify attack vectors, threat tactics and attacker techniques and exploits
  • Create incident reports that follow a common format like Kill Chain or MITRE
  • Configure and tune alerting and monitoring of events that occur within the near real time environment
  • Configure technologies such as SIEM, SOAR, Vulnerability Management tools, WAF, EDR, Secure DNS, and other operational technologies to detect and or prevent cyber intrusion
  • Create reporting and metrics using the previously mentioned technologies
  • Coordinate internal and external security assessments and penetration tests
  • Mentor and provide training and knowledge to all levels of Cyber Security Analysts
  • Stay informed of current events in the security industry including the latest exploits and threats as well as preventative measures, remediation, and restoration techniques
  • Manage wide range of incidents (Phishing, Malware, Ransomware, etc.) using proven best practices for incident response
  • Utilize industry best practices for forensic analysis of computer equipment and malware
  • Coordinate with existing MSP’s

TO BE SUCCESSFUL IN THIS ROLE, YOU’LL NEED:

  • 5+ years of Information Security, network security, or related field
  • Ability to respond effectively to cyber security incidents.
  • Experience with Network and Systems Forensics
  • 3+ years’ experience utilizing CrowdStike for Incident Response and Cyber Threat Hunting
  • Experience with forensic tools such as FTK, Sleuthkit, Purview, etc
  • Experience curating Cyber Threat Intel based on the findings of Incident Response and Cyber Threat Hunting
  • Experience utilizing Cyber Threat Intel and Risk frameworks to improve vulnerability management programs
  • Demonstrated operating proficiency in multiple security platforms and layers including Anti-virus, Active Directory and Operating Systems.
  • Willingness to learn and adapt to new trends in Cyber Security.
  • Ability to drive and execute improve of current processes, think outside the box and constantly evaluate better more efficient.
  • Work with limited supervision
  • Experience identifying and triaging malware
  • Experience with forensic processes and procedures (chain of custody, computer acquisition techniques, and memory acquisition techniques)
  • Maintain hyper-current knowledge of extant vulnerabilities and threat landscape
  • Experience using Security Information Event Management tools
  • Experience using EDR solutions to identify and contain cyber threats
  • Knowledge of TCP/IP, computer networking, routing, and switching
  • Experience with PCAP analysis
  • Strong troubleshooting, reasoning, and problem-solving skills
  • Interest in learning and mastering unfamiliar tools, new vulnerabilities to understand how they work
  • Understanding common network/web/app attacks, attack methods, and network defense architectures.
  • Effectively manage a number of projects and priorities in parallel.
  • Ability to speak and communicate effectively with management,
  • Ability to collaborate across all functional groups within IT and external to IT globally.
  • Ability and experience in writing clear and concise technical documentation.
  • Ability to speak and write fluently in English
  • Associate or bachelor’s degree in computer science, information security, or related field and 5 years equivalent experience in a cyber security role
Loading...