See Similar Listings
Job   USA   CA   Riverside Area   Engineer -

Engineer III : Security Analyst (Hybrid Work Schedule) | Engineer in Engineering Job in Rancho Cuc1

This listing was posted on Tip Top Job.

Engineer III : Security Analyst (Hybrid Work Schedule)

Location:
Rancho Cucamonga, CA
Description:

Job Requisition ID: 9475 Position Summary/Position Under the direction of the Manager, Information Security Operations, the Engineer III : Security Analyst will use subject matter expertise to give guidance, best practices, and support to business and technology stakeholders during the deployment of critical business and technology initiatives. The role will have a deep understanding of global threat actors and their tactics, techniques, and procedures employed during cyberattacks.The Security Analyst will be subject matter expert in cybersecurity and maintain documentation related to policies, standards, and procedures; mentor team members; and provide consultative services to teams and stakeholders to improve the security posture of their environments and perform general cybersecurity engineering functions. This position will support various Information Technology Security functional areas related to one or more of the following: Application Security, Security Operations and Vulnerability. Major Functions (Duties and Responsibilities) 1. Monitor firewalls, network and host intrusion prevention/detection systems, virtual private networks, threat intelligence platforms, endpoint protection, security training platforms, email security, forensic tools, public/private/hybrid cloud infrastructure, identity and access management systems, and physical security systems.2. Monitor security operations center tools and dashboards.3. Perform threat hunting activities using security operations center tools across the environment using internal or external threat intelligence sources.4. Architect cybersecurity solutions for on premises and cloud computing environments.5. Participate in and/or leads cybersecurity engineering projects.6. Assist with risk analysis activities.7. Assist with designing and implementing controls to mitigate risk.8. Identify attack surface reduction opportunities through vulnerability data analysis and/or identify opportunities for process improvements and automation. ADDENDUMSecurity Operations1. Monitor security systems and provide early response to potential threats.2. Manage security incident response; serve as escalation point for conducting investigations into security incidents involving advanced and sophisticated threat actors and TTPs.3. Design, test, and implement response playbooks, orchestration workflows and automations.4. Research, recommend and test new security technologies and platforms5. Analyze technologies and establishes highly effective processes and protocols to ensure comprehensive protection exists to prevent unauthorized entry into company networks and systems.6. Support automation and orchestration to maximize team talent and reduce routine tasks.7. Drive creation of countermeasures to protect company personnel and information assets.8. Document, prioritize, and formally report incidents, root cause analyses, and after:action reviews.9. Coordinate between internal and external resources protecting enterprise systems.10. Periodically attend and participate in change management policy discussions and meetings.11. Understand breach and attack simulation solutions to validate and improve the effectiveness of preventative controls and incident response.12. Motivate employees to maximize rigorous system security controls, focusing on reducing complexity and maturing security practices.13. Work as a team to consistently learn and share advanced skills and foster team excellence. Major Functions (Duties and Responsibilities) Cont Vulnerability1. Work analytically to solve both tactical and strategic problems within the vulnerability management program.2. Plan, develop, configure, and execute vulnerability scans on a wide variety of corporate and business information systems both on prem and cloud based.3. Establish rapport with other IS teams to mature the vulnerability management program.4. Respo
Posted:
April 4 on Tip Top Job
Visit Our Partner Website
This listing was posted on another website. Click here to open: Go to Tip Top Job
Important Safety Tips
  • Always meet the employer in person.
  • Avoid sharing sensitive personal and financial information.
  • Avoid employment offers that require a deposit or investment.

To learn more, visit the Safety Center or click here to report this listing.

More About this Listing: Engineer III : Security Analyst (Hybrid Work Schedule)
Engineer III : Security Analyst (Hybrid Work Schedule) is a Engineering Engineer Job located in Rancho Cucamonga CA. Find other listings like Engineer III : Security Analyst (Hybrid Work Schedule) by searching Oodle for Engineering Engineer Jobs.