Cyber Security Analyst SOC Monitoring - Ciudad de México - Nissan

Nissan
Nissan
Empresa verificada
Ciudad de México

hace 1 semana

Rodrigo Fernández

Publicado por:

Rodrigo Fernández

Reclutador de talento para beBee


Descripción

With a focus on Mobility, Operational Excellence, Value to our Customers and the Electrification of vehicles, you can expect to be part of something exciting.

From the sleek design of our vehicles to the unique opportunities we offer around the globe, Nissan exemplifies ingenuity in everything we do.

Our people are what drive the business forward.


Summary:


As a trusted member of the cybersecurity team and industry community, the analyst works closely with internal technical teams, business units and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, government agencies and public affiliation peers.


The Cyber Security Analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know.

Among the research conducted, the analyst will seek to uncover patterns and trends and be forward-thinking as to how threats may evolve.

Furthermore, the analyst will participate in simulation exercises designed to uncover weaknesses related to threats, with the goal of implementing defensive solutions prior to attacks and disrupting attacks in progress.

The analyst will also distill threat intelligence so technical and non-technical contacts can understand it and make educated decisions about next-step actions.

The Cyber Security Analyst works in tandem with Manager and Sr. Manager to elevate the company's security posture.


Job Duties:


  • As an active member of the team, monitor and process response for security events.
  • Plan and execute regular incident response and postmortem exercises, with a focus on creating measurable benchmarks to show progress (or deficiencies requiring additional attention).
  • Stay current with and remain knowledgeable about new threats. Analyze attacker tactics, techniques and procedures (TTPs) from security events across a large heterogeneous network of security devices and enduser systems.
  • Participate in threat modeling collaboration with other members of the security team.
  • Leverage automation and orchestration solutions to automate repetitive tasks.
  • Assist with incident response as events are escalated, including triage, remediation and documentation.
  • Aid in threat and vulnerability research across event data collected by systems.
  • Work alongside other security team members to hunt for and identify security issues generated from the network, including thirdparty relationships.
  • Share information as directed with other team members and ISACs.
  • Seek opportunities to drive efficiencies.
  • Manage security event investigations, partnering with other departments (e.g., IT) as needed.
  • Evaluate SOC policies and procedures, and recommend updates to management as appropriate.
  • Adhere to service level agreements (SLAs), metrics and business scorecard obligations for ticket handling of security incidents and events.
  • Partner with the security engineering team to improve tool usage and workflow, as well as with the advanced threats and assessment team to mature monitoring and response capabilities.
  • Leverage knowledge in multiple security disciplines, such as Windows, UNIX, Linux, data loss prevention (DLP), endpoint controls, databases, wireless security and data networking, to offer global solutions for a complex heterogeneous environment.
  • Maintain working knowledge of advanced threat detection as the industry evolves.
  • Perform other duties as assigned.

Skills and Experience:


  • Experience driving measurable improvement in monitoring and response capabilities at scale.
  • Experience working with SIEM systems, threat intelligence platforms, security automation and orchestration solutions, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), DLP and other network and system monitoring tools.
  • Knowledge of a variety of Internet protocols.
  • Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.
  • Certifications: SANS GCIH, GCIA, or CISSP

Education:


  • Bachelor's degree in a related discipline or equivalent work experience.
Professional security certifications preferred

  • Has one or more of security certifications including SANS GCIH, GCIA, or CISSP

Frameworks:


Nissan (NMEX,NEdM, NRFS, NRFM y ANZEN) realiza contrataciones con base al cumplimiento del perfil de puesto en la vacante, sin distinción (ni discriminación por género, identidad y/o expresión de género, orientación sexual, ) raza, color, idioma, religión, opinión política o de cualquier otra índole, origen nacional o social, posición económica, nacimiento o cualquier otra condición.
**Nissan (NMEX,NEdM, NRFS, NRFM and ANZEN) hires based on the fulfillment of the job profile in the vacancy, without distinction or discrimination based on gender, gender identity and/or expression, sexual orientation, race, color, lang

Más ofertas de trabajo de Nissan