Sr. Security Analyst: Indent Analyst (4 day work week)

Shannon, Ireland

Applications have closed

Extreme Networks

View company page

Extreme Networks Named to Computerworld’s 2023 List of Best Places to Work in IT!
Over 50,000 customers globally trust our end-to-end, cloud-driven networking solutions and rely on our top-rated services and support to accelerate their digital transformation efforts and deliver progress like never before and with double digit growth year over year, no provider is better positioned to deliver better outcomes on scale, than Extreme.
We believe in “walking the walk” of our strong core values which enable us to successfully advance together. Diversity and Inclusion is a vital part of our values and beliefs, and we’re proud to foster an environment where every Extreme employee can thrive. 
Come become part of something big with us! We are a global leader, with hubs in North America, South America, Asia Pacific, Europe, and the Middle East.

Sr. Security Analyst: Indent Analyst (4 day work week)

Schedule:
Saturday-12 hours on-call
Sunday-12 hours on call
Mon- 8 hours first shirt
Tuesday-8 hours first shift
 
Job Summary:
As a key member of the Information Security Operations team, you will be primarily responsible for the monitoring & responding to security events & tickets; investigating root cause analysis of issues and updating and investigating threat feeds and alerts; and management and operation of the SIEM (Security Information and Event Management) solution. In addition to the above tasks, you will support the wider information security and IT teams as appropriate on additional requests.
The successful candidate should have a mind set to challenge existing processes, always looking for better ways to achieve the team and business goals through more efficient or updated processes.
As part of the Information Security Operations Team, this role will include on-call shift work over a weekend.
 
Job Requirements:
The job requirements include but are not limited to the following tasks.
·        Continuously monitor SIEM Console, ServiceNow incident queues and SecOps dashboards for alerts, tickets, and issues
·        Notify system owners and Escalate security incidents per the incident response escalation procedure.
·        SIEM Alert tuning and configuration
·        Monitor devices system performance, system resources utilization (disk space, indexed data) and health monitoring.
·        Add, configure new log, and event sources into SecOp’s tools.
·        Fine tuning and policy enhancement for SIEM and other SecOp’s tools.
·        Responsible for troubleshooting SIEM and SOC (Security Operations Center) operational related issues
·        Assist in case of major outbreak or any critical incident related issue.
·        SIEM Patching and configuration back up operations.
·        The Incident response team will perform a deep dive incidents analysis by correlating data from the various sources.
·        Respond to all reported security incidents.
·        Follow up with teams for incident closure.
·        Maintain incident records as per the guidelines.
·        Capture and protect the evidence related to an incident.
·        Develop IoC (Indicators of Compromise) related to new threats.
·        First level investigation and malware analysis
·        Perform incident damage assessment.
·        Update stakeholders about security incidents progress
·        Strong interpersonal communication skills
·        Good verbal and written communication skills
·        Ability to analyze problems and create solutions Maintain confidentiality of information.
·        Must be able to prioritize projects, maintaining a sense of urgency to meet deadlines.
·        Must possess the ability to follow verbal and written directions.
·        Must be a self-starter and able to work well in independently and in Team.
·        Must be able to use critical thinking skills and judgment.
·        Must be able to work positively and professionally with a wide range of personalities.
·        Must be able to accept constructive criticism.
 
Experience
·        Ideal candidates will have background / experience in security operations. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.
·        The ideal candidate should be able to work autonomously and be self-motivated.
·        The ideal candidate will have experience using / performing searches and tuning a SIEM product.
·        The ideal candidate will have experience with the Microsoft suite of security tools.
·        The ideal candidate will have experience in using the Mitre framework.
·        The requirements listed above are representative of the knowledge, skill and/or ability required.
·        Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
Extreme Networks, Inc. (EXTR) creates effortless networking experiences that enable all of us to advance. We push the boundaries of technology leveraging the powers of machine learning, artificial intelligence, analytics, and automation. Over 50,000 customers globally trust our end-to-end, cloud-driven networking solutions and rely on our top-rated services and support to accelerate their digital transformation efforts and deliver progress like never before. For more information, visit Extreme's website or follow us on Twitter, LinkedIn, and Facebook.

We encourage people from underrepresented groups to apply. Come Advance with us! In keeping with our values, no employee or applicant will face discrimination/harassment based on: race, color, ancestry, national origin, religion, age, gender, marital domestic partner status, sexual orientation, gender identity, disability status, or veteran status. Above and beyond discrimination/harassment based on “protected categories,” Extreme Networks also strives to prevent other, subtler forms of inappropriate behavior (e.g., stereotyping) from ever gaining a foothold in our organization. Whether blatant or hidden, barriers to success have no place at Extreme Networks.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Analytics Artificial Intelligence Automation Cloud Incident response Machine Learning Malware Monitoring SecOps SIEM SOC

Perks/benefits: Career development Team events

Region: Europe
Country: Ireland
Job stats:  18  0  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.