Perform event correlation using information gathered from a variety of sources to gain situational awareness to detect, confirm, contain, remediate, and recover from attacks.
Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information; Perform root cause analysis to determine tactics, techniques, and procedures (TTPs) for intrusions.
Assist in the construction of signatures or indicators of compromise (IOCs) which can be implemented on cyber defense network tools in response to new or observed threats
Notify SOC managers and cyber incident responders of suspected cyber incidents and articulate the events history, status, and potential impact for further action in accordance with the cyber incident response plan and procedures.
Document ongoing incidents, after action reports and escalate incidents
Work with cross-functional teams to resolve computer security incidents and vulnerability compliance.
Support Incident Response efforts - evidence collection, documentation, communications, and reporting.
Responsible for the enforcement of corporate information security policies to protect McAfees information assets and intellectual property.
Recommend and drive additional security controls to meet current and future needs
About you:
You have 3+ years of experience in security
You have solid critical thinking and analytical skills
Application of cybersecurity principles and risk management basics to mitigate risk
Leading efforts during one or more phases of Incident Response lifecycle
Cloud security monitoring detection and response (AWS, GCP and Azure)
Mentoring junior analysts and improving security technologies processes
Taken initiatives to drive improvements for security technologies and processes
Working knowledge of the Security Operation Center (SOC) the Information Security Common Body of Knowledge and best practices
Good understanding of and like to remain aware of recent cyber risks and threats.
Preferred certifications: GCIH, GCFA, CEH, Network+, Security+, cloud service provider certifications or equivalent industry standard certifications
You are willing to work on rotating shifts and weekends
Keyskills: Root cause analysis GCP Information security SOC Diversity and Inclusion Intellectual property Cloud Vulnerability Risk management Security operations