Security Analyst III - Mexico

Mexico - Remote(Jalisco/Mexico Only)

Applications have closed

Rackspace

As a cloud computing services pioneer, we deliver proven multicloud solutions across your apps, data, and security. Maximize the benefits of modern cloud.

View company page

Job Profile SummaryPerform real-time monitoring and analysis of security events from multiple sources. Identify source or cause and provide recommendations for secure infrastructure through policy, practices, risk management, engineering, and improved operations. Responsible for adhering to company security policies and procedures and any other relevant policies and standards as directed.
Career Level Summary• Requires in-depth conceptual and practical knowledge in own job discipline and basic knowledge of related job disciplines• Solves complex problems• Works independently, receives minimal guidance• May lead projects or project steps within a broader project or may have accountability for on-going activities or objectives• Acts as a resource for colleagues with less experience• Level at which career may stabilize for many years or until retirement Critical Competencies• Systems Thinking: Takes a whole systems approach to analyze issues and implements holistic solutions by ensuring that linkages between structure, people, process, and technology are made• Idea Creation: Identifies new technologies, applications, and process changes to continually improve efficiency or technology performance
Key Responsibilities• Other Incidental tasks related to the job, as necessary.• Monitor and analyze log files from a variety of sources, including but not limited to NIDS, HIDS, firewall logs, and system logs (Windows and Unix) to identify possible threats to network security• Triage security events: assess the priority and determine risk• Receive escalations of events from lower level analysts• Use the Cyber Kill Chain, current intelligence information, and investigative techniques to proactively review customers environments searching for anomalous behavior• Identify, modify, and manipulate applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files)• Reconstruct cyber events, assess cyber threat and scope of impact, identify and track any internal lateral or external movement, and develop response solutions• Interact with security community to obtain technical cyber threat intelligence; track cyber threat actors/campaigns based on technical analysis and open source/third party intelligence• Research and track new exploits and cyber threats; conduct cursory and/or in-depth computer forensic investigations (i.e. packet captures, endpoint behaviors, etc.), or collaborate with peers when appropriate for hand-offs/escalations• Conduct analysis of malicious code and weaponized documents through behavioral analysis or reverse engineering.• Communicate and report on key intelligence, analysis and response activities, relevant metrics, and KPIs• Work as a part of an Incident Response Team to investigate and remediate active threats while accurately documenting results using standard incident response techniques and the incident response process Knowledge• Proficient knowledge of Cybersecurity principles, threats, and vulnerabilities• Proficient knowledge of incident response methodologies• Proficient knowledge of cyber investigative techniques• Deep understanding and continued learning of current cyber threat trends• Proficient knowledge of computer networking concepts and protocols, and network security methodologies• Proficient knowledge of Proficient physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, NICs, Data storage)• Proficient knowledge of defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).• Proficient knowledge of virtualization and cloud based Infrastructure (AWS, Azure, GCP)• Proficient knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files• Proficient knowledge of networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications• Proficient knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA])• Proficient knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)• Requires in-depth conceptual and practical knowledge in own job discipline and basic knowledge of related job disciplines • Has knowledge of best practices and how own area integrates with others; is aware of the competition and the factors that differentiate them in the marketSkills• Intermediate system administration, network, and operating system hardening techniques• Proficient skills in hacking methodologies in Windows or Unix/Linux environment• Proficient skills in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)• Proficient skills in Security Information and Event Management tools - Searching, aggregating, and correlating data• Demonstrated effective oral and written communication skills• Demonstrated effective problem solving & analytical skills• Team player, willing to work with others in sharing information to help increase overall team knowledge

About Rackspace TechnologyWe are the multicloud solutions experts. We combine our expertise with the world’s leading technologies — across applications, data and security — to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenges, designing solutions that scale, building and managing those solutions, and optimizing returns into the future. Named a best place to work, year after year according to Fortune, Forbes and Glassdoor, we attract and develop world-class talent. Join us on our mission to embrace technology, empower customers and deliver the future.  More on Rackspace TechnologyThough we’re all different, Rackers thrive through our connection to a central goal: to be a valued member of a winning team on an inspiring mission. We bring our whole selves to work every day. And we embrace the notion that unique perspectives fuel innovation and enable us to best serve our customers and communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, color, disability, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know.

Tags: AES Application security AWS Azure Cloud Cyber Kill Chain Encryption Exploits Firewalls GCP Incident response KPIs Linux Log files Monitoring Network security Open Source Reverse engineering Risk management Scripting SQL TCP/IP Threat intelligence UNIX Vulnerabilities Windows XSS

Perks/benefits: Team events

Regions: Remote/Anywhere North America
Country: Mexico
Job stats:  13  1  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.