Saltar al contenido principal
Volver a la búsqueda

SOC Cybersecurity Incident Response Team Security Analyst II

Req ID: J2298097

  • Ubicación
    Tampa/San Petersburgo, FL, Florida, United States of America
  • Categoría Tecnologias de la Información
  • Publicado viernes, 17 de diciembre de 2021
  • Tipo Tiempo completo
  • Tipo de Empleo Empleado Permanente

Descripción del Trabajo

Performs advanced monitoring and reporting of security events. Administrates security tools and devices ensuring proper functionality. Conducts investigations providing all required data for incident response.

-  Supports 24/7 global operations responding to security events in the environment; on-call as required.

-  Performs advanced monitoring of security events; studies and reviews device security logs.

-  Investigates a variety of events by correlating data from various sources to determine the risk to Jabil.
-  Performs advanced incident analysis from logs and monitoring activities.

-  Assists in large-scale security incidents, investigation, and response activities; advises on remediation.

-  Creates/refines log monitoring reports, searches, or basic investigative tools to enhance monitoring.
-  Handles escalations from SOC Security Analysts I.
-  Performs analysis of the environment (e.g. port scans, activity monitoring, intrusion detection).
-  Performs intermediate-level Health Checks and routine administration for security tools.
-  Differentiates between security events or incidents to initiate incident response actions appropriately.

-  Participates in IT security or customer audit activities.
-  Performs mentoring and education for security staff members.
-  Drives continuous improvement through trend reporting analysis and metrics management.
-  Assures procedures and work instructions are efficient and not redundant.
-  Identifies and implements new analytic methods for detecting threats.

-  Anticipates and meets customer expectations by solving problems quickly and effectively.
-  Maintains confidentiality in all security activities whether internal to Jabil or customer specific.
-  Interprets a variety of instructions furnished in written, oral, diagram or schedule form.

- Lead small projects/initiatives as assigned.

-  May perform other duties and responsibilities as assigned.

-  Ability to define problems, collect data, establish facts, and draw valid conclusions.

- Ability to effectively communicate analytical data to varied audiences, including executives.

- Ability to influence and build credibility as a peer through strong interpersonal and leadership skills.

- Ability to perform well under significant enterprise-wide pressure with a sense of urgency.

Minimum Qualifications:

- Bachelor's degree in Computer Science, Information Systems, or related field or 3-5 years Security Operations, Network Administration or equivalent knowledge.

- Security related certifications:  Security + or GSEC and GCIH

- Strong working knowledge of perimeter technologies (e.g. firewalls, proxies).

- Strong working knowledge of security tools (e.g. SIEM, NetFlow, IDS/IPS, endpoint solutions, DLP).

- Strong working knowledge of networking (TCP/IP, network architecture) and packet capture and analysis.

- Advanced technical knowledge of operating systems, network services, applications, and security logging.

Preferred Qualifications: 

- Master's degree in Information Security, Cybersecurity, or Computer Network Defense.

- Relevant security related certifications a plus:  GCIA, GCED, GMON, CEH, CCNA, CySA +

- Previous experience in scripting or programming (e.g. Python, PowerShell, PERL, Splunk SPL).

- Direct experience in an enterprise-level Cyber Incident Response Team or Security Operations Center.

Image 17 (1)

¿No estás listo para aplicar? ¡Únase a la red profesional de Jabil!

Más información sobre las próximas oportunidades profesionales y eventos Jabil

Únete ahora