Information Security Operations Analyst Intern (1077)

Emeryville, CA

Applications have closed

Amyris

We provide a scalable way forward in a world where demand for the earth’s bounty far exceeds supply. We make what’s scarce, abundant for all.

View company page

Amyris, a leader in clean synthetic biology, is seeking a motivated individual to help support, monitor and implement our information security and risk program.As a data driven organization, we are driven to ensure the highest level of cybersecurity protections as well as complying with industry standard cybersecurity frameworks.
Let's work together to make the world a better, safer place.
The Information Security Operations Analyst Intern is responsible for a diverse set of security monitoring, incident handling, and threat hunting duties in support of Amyris and its customers.  The Analyst must adapt, expand, and apply their security and technology experience to keep pace with industry and customer demands, as well as communicate complex security, cloud, and technology concepts to internal and external stakeholders. Jr. Security Analysts will collaborate with other team members on special projects and professional development as needed.

Responsibilities

  • Monitor customer security tools and data sources for suspicious activity
  • Perform threat hunting and data analysis activities using a diverse set of tools
  • Manage, optimize, and configure security controls, such as endpoint security and vulnerability scanners
  • Conduct incident response and incident handling activities in accordance with established rule books and policies
  • Document security incidents and improvements
  • Assist in internal process improvement, automation, and optimization projects as needed
  • Conduct incident detection and response for customer environments. This includes:
  • Perform threat hunting on security controls, such as:
  • Next Generation Firewalls
  • Endpoint Protection platforms
  • Vulnerability management and scanners
  • Windows and Linux server logs
  • Application server logs
  • Identity management platforms
  • OSINT
  • Identify, assess, and document incidents.
  • Remediate issues, or communicate remediation strategies to customers or other Analysts
  • Optimize alerting and detection capabilities
  • Manage SIEM alerts, correlations, data, reports, and dashboards to assist with detection and response
  • Report on threat vulnerability data using risk-evaluation methodologies

Qualifications

  • IT experience including systems, network, and cloud administration.
  • At least one year of experience with security technologies, such as NGFW, IDS/IPS, endpoint security, or vulnerability management platforms.

  • Required Knowledge, Skills and Abilities
  • Strong written communication skills
  • Familiarity with network, system, and security tools such as:
  • Next Generation Firewalls (NGFW)
  • Intrusion Detection/Prevention systems (IDS/IPS)
  • Vulnerability Management platforms
  • Enterprise endpoint protection
  • Web application firewalls
  • Security information and event management (SIEM) platforms
  • DNS and fundamental TCP/IP protocols
  • Familiarity with management, administration, and architecture of cloud platforms such as AWS, Azure, or GCP
  • Configuring, optimizing, and analyzing security alert data
  • Successfully execute and triage incident response procedures
  • Understand threat intelligence models and data

  • Education, Certifications and Training
  • Knowledge with one or more cybersecurity frameworks (ISO, NIST, etc)
#LI-IF1
Amyris, a leader in industrial synthetic biology, uses its innovative bioscience solutions to achieve renewable products by converting plant sugars into hydrocarbon molecules. Amyris’ molecules are used in wide range of specialty & performance chemicals, flavors & fragrances and in applications ranging from cosmetics to biofuels. Learn more at www.amyris.com.
Under the California Consumer Privacy Act of 2018 (“CCPA”), Amyris is required to inform California residents who are our job applicants (“Applicants”) about the personal information we collect about you when you apply to a job on this site.
As an Applicant, you have the right to know and understand the categories of personal information we collect about you, and the purposes for which the categories of personal information shall be used, pursuant to the CCPA.
By clicking the “APPLY FOR THIS JOB” button below and submitting your job application, you agree you have reviewed the complete Privacy Notice for Employees, Independent Contractors and Job Applicants.
If you have any questions regarding this information, please contact Amyris at privacy@amyris.com
As a VEVRAA Federal Contractor, Amyris is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, disability status, protected veteran status, or any other characteristic protected by law. Amyris complies with applicable state and local laws governing nondiscrimination in employment.
If you are a recruiter or placement agency, please do not submit resumes to any person or email address at Amyris, Inc. prior to having a signed agreement. Amyris is not liable for and will not pay placement fees for candidates submitted by any agency other than its approved recruitment partners. Furthermore, any resumes sent to us without an agreement in place will be considered your company’s gift to Amyris and may be forwarded to our recruiters for their attention.

Tags: Automation AWS Azure CCPA Cloud DNS Endpoint security Firewalls GCP IDS Incident response Industrial Intrusion detection IPS Linux Monitoring NGFW NIST OSINT Privacy SIEM TCP/IP Threat intelligence Vulnerability management Windows

Perks/benefits: Career development

Region: North America
Job stats:  11  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.