Cybersecurity Analyst 2

Manila

Dexcom

Dexcom kontinuierliche Gewebezuckermessung (CGM) - Entdecken Sie die intelligente und einfache kontinuierliche Gewebezuckermessung. Entwickelt, um Menschen mit Diabetes zu helfen, ihren Gewebezuckerspiegel auf einfache Weise zu überwachen....

View company page

Apply now Apply later

The Company

Dexcom Corporation (NASDAQ DXCM; Market Cap $44.3B) is a pioneer and global leader in continuous glucose monitoring (CGM). Dexcom began as a small company with a big dream: To forever change how diabetes is managed. To unlock information and insights that drive better health outcomes. Here we are 25 years later, having pioneered an industry. And we're just getting started. We are broadening our vision beyond diabetes to empower people to take control of health. That means personalized, actionable insights aimed at solving important health challenges. To continue what we've started: Improving human health.

We are driven by nearly 10,000 ambitious, passionate people worldwide who are willing to fight like warriors to earn the trust of our customers by listening, serving with integrity, thinking big, and being dependable. We've already changed millions of lives and we're ready to change millions more. Our future ambition is to become a leading consumer health technology company while continuing to develop solutions for serious health conditions. We'll get there by constantly reinventing unique biosensing-technology experiences. Though we've come a long way from our small company days, our dreams are bigger than ever. The opportunity to improve health on a global scale stands before us.

Meet the team:

The Cybersecurity Analyst is a Tier 2 role primarily focused on security operations, vulnerability management and other allied security services. Security Operations tasks involves the end-to-end cycle of incident management (including discovery, threat analysis and correlation, response and remediation). Vulnerability management involves activities relating to vulnerability scanning, Penetration Testing. It also involves working on related security functions such as project implementation of Security Operations projects, and security engineering support.  The successful candidate will be able to practice a fulfilling and challenging role of protecting the company’s global infrastructure.

Where you come in:

  • You will serve as a Tier 2 Security Operations Center (SOC) analyst, monitoring and responding to security alerts from the MSSP, SIEM or from various security tools or instrumentation such as endpoint security, secure email gateway, firewalls, IDS, DLP, etc.

  • You will perform incident response activities, assessing and analyzing threats to network and endpoint systems, conducting basic network and endpoint forensics, and ensuring threat containment.

  • You will be supporting activities of third-party penetration testing consultants and drive remediation activity.

  • You will process and manage requests for various security services, for example, responding to security inquiries from customers, reviewing malicious or blocked attachments or websites, reviewing firewall change requests, performing vulnerability scans, etc.

  • You will support or drive the remediation or closure of control gaps, risks and findings from audits and certification activities.

  • You will contribute to SOC processes, documentation, metrics, and reporting.

  • You will participate in the implementation of projects owned by Security Operations on a supporting role capacity

  • Ad Hoc: support other Infosec groups such as Security Engineering, App/Prod Security, OT Security or GRC ; (when capacity permits)

What makes you successful:

  • Your experience in working with SIEM platforms (Splunk preferred) and security operations.

  • Your hands-on experience with security technologies such as SIEM, IDS, DLP, vulnerability scanning, firewall, endpoint security or email security systems.

  • Your experience in handling, investigating, and responding to malware events.

  • Your experience with incident response, network and/or endpoint forensics.

  • Your experience managing and securing Windows, Linux, and Mac systems.

  • Your security certification such as Security + or equivalent (desirable but not required)

  • Bachelor’s Degree in Computer Science or directly related field, or equivalent work experience.

  • At least 1.5 years experience in a SOC analyst role

What you’ll get:

  • A front row seat to life changing CGM technology. Learn about our brave #dexcomwarriors community.

  • A full and comprehensive benefits program.

  • Growth opportunities on a global scale.

  • Access to career development through in-house learning programs and/or qualified tuition reimbursement.

  • An exciting and innovative, industry-leading organization committed to our employees, customers, and the communities we serve.

#LI-Hybrid

To all Staffing and Recruiting Agencies: Our Careers Site is only for individuals seeking a job at Dexcom. Only authorized staffing and recruiting agencies may use this site or to submit profiles, applications or resumes on specific requisitions. Dexcom does not accept unsolicited resumes or applications from agencies. Please do not forward resumes to the Talent Acquisition team, Dexcom employees or any other company location. Dexcom is not responsible for any fees related to unsolicited resumes/applications.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0
Category: Analyst Jobs

Tags: Audits Computer Science Endpoint security Firewalls Forensics IDS Incident response Linux Malware Monitoring Pentesting SIEM SOC Splunk Vulnerability management Vulnerability scans Windows

Perks/benefits: Career development Health care Team events

Region: Asia/Pacific
Country: Philippines

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.