Listing Description
With a $1 billion dollar investment in cutting-edge technology over the next 3 years, continuous innovation coupled with best in class information security technologies that protect millions of families we call customers is at the heart of everything that we do.
Join our Cyber Security team and see what it's like to work for the most engaging retailer in the world.
We offer flexible schedules (including work from home opportunities), clear career paths, autonomy, and opportunities to work with the newest technologies including Cloud Security Tools.
What We’re Looking For:
Deep technical experience in digital forensics, incident response, and phishing attack analytics
Technical knowledge and experience in operating system security and security best practices.
Demonstrated understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, defense-in-depth and common security elements.
Analytical and problem solving skills related to networking, operating systems, and malware analysis.
Demonstrated interest in computer security, incident response, or computer forensics.
Experience with network monitoring tools to monitor attacks/threats preferred.
Organization and documentation.
Excellent written and verbal communication skills.
Experience in securing large enterprise networks.
Bachelor's Degree in MIS, Computer Science or related field (preferred)
CISSP or other relevant security certifications (preferred)Review and operate enterprise wide security platforms, investigate events using enterprise Security Information, Event Manager (SIEM) and various network forensic tools, and work with appropriate business units to remediate.
Provide written summaries of security event indicators, recommend remediation activities, and other relevant information to business units.
Prepare custom reports for a mixed technical and non-technical audience.
Add /Remove log sources. Troubleshoot issues with log sources or systems with vendor, and report system defects as needed.
Initiates automation as necessary to effectively manage system logs and security alarm reporting.
Utilize Threat Intelligence Platform(TIP) to aggregate, correlate, and analyze threat data from multiple sources.
Inject Tactics, Techniques and Procedures(TTPs) into applicable tools.
Map Tactics, Techniques and Procedures(TTPs) to MITRE ATT&CK framework.
Apply broad security industry, technology, business and professional knowledge to contribute to policy-making and process design.
Complete projects and tasks on an as needed basis.
Listing Details
- Citizenship: Us Citizen
- Incentives: Not Provided
- Education: Bachelors Degree
- Travel: No Travel
- Telework: Full Telecommute