Toyota Tsusho Europe

Detection & Response Analyst

Toyota Tsusho Europe

full-time

Posted on:

Location Type: Remote

Location: Remote • Texas • 🇺🇸 United States

Visit company website
AI Apply
Apply

Job Level

Mid-LevelSenior

Tech Stack

CloudCyber SecurityDNSFirewallsSplunkSQL

About the role

  • Provide ongoing support to the Regional Security Operations program.
  • Maintain an effective 24x7 monitoring and detection services to internal and external clients.
  • Act as the point of escalation for all security incidents; provide expert level feedback regarding current monitoring and ways to improve it.
  • Act as the shift lead; fulfil this responsibility through leadership and guidance of ID team members, proactively prioritizing, identifying, analyzing and remediating threats.
  • Ensure that the ID Analysts’ daily work activity is completed to the required quality levels and timelines, by verifying that their responsibilities are executed, in accordance with the expectations set by the ID Team Lead.
  • Triage security incidents and perform in-depth analysis using Cyber Threat Intelligence, intrusion detection systems, firewalls and other boundary protection devices.
  • Maintain an understanding of the overall threat landscape (cyber, malware, botnets, phishing, DDoS, physical).
  • Provide 24x7 coverage to support the RSOC services; Participate in an on-call rotation.
  • Train and mentor team members within the Incident Detection Team.
  • Improve the effectiveness and efficiency of day-to-day operations.
  • Assist with service requests from customers and internal teams.
  • Assist with containment and remediation of threats during incidents. Use internal ticketing system to track investigated incidents and capture relevant details.
  • Support Incident Response efforts as needed, including providing counsel, working with the IR team, as well as other involved stakeholders within the organization and customers to drive forward remediation activities.
  • Conduct threat hunting activities based on internal and external threat intelligence.
  • Create and update daily and monthly reports.
  • Contribute to the creation of documentation to standardize processes and procedures, including playbooks to improve internal processes and procedures.
  • Use investigation findings to identify gaps and recommend security posture improvements.
  • Identify, recommend, coordinate, and deliver timely knowledge to support teams.
  • Other tasks and responsibilities as assigned by leadership.

Requirements

  • Experience working with cyber security tools and software such as Sentinel, Splunk, ATP, Symantec End Point, TrendMicro Antivirus, McAfee Web Gateway, Checkpoint Firewalls, Bluecoat, Sourcefire, Active Directory, or relevant cyber security assets.
  • Excellent critical thinking, logic, and solution orientation and to learn and adapt quickly.
  • Ability to learn and operate in a dynamic environment.
  • Detail-orientated and analytical skills; Problem-solving skills.
  • Strong verbal and written communication skills.
  • Proficient with Microsoft Office & documentation skills (Word, Excel, PowerPoint)
  • 4+ years of experience in Security Operations monitoring.
  • Experience with Security Operations processes, procedures, and services 􀁸 Advanced knowledge of network monitoring and network exploitation techniques.
  • Strong technical background in security, network, infrastructure, cloud, applications.
  • Knowledge of risk assessment tools, technologies and methods.
  • Experience with common attack vectors, including advanced adversaries (nation state/financial motivation).
  • Knowledge around common web application attacks including SQL injection, cross-site scripting, invalid inputs, and forceful browsing.
  • Knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB.
  • Experience working with cyber security tools and software such as Splunk, ATP, Symantec End Point, TrendMicro Antivirus, McAfee Web Gateway, Checkpoint Firewalls, Bluecoat, Sourcefire, Active Directory, or relevant cyber security assets.
  • Technical certifications such as GCIA, GCFA, GCIH or CASP is a plus.

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
cyber securityincident detectionthreat analysisnetwork monitoringrisk assessmentSQL injectioncross-site scriptingDDoSmalwarebotnets
Soft skills
critical thinkingproblem-solvingdetail-orientedanalytical skillscommunication skillsleadershipadaptabilitysolution orientationmentoringteam collaboration
Certifications
GCIAGCFAGCIHCASP
Stryker

Lead Analyst, Reporting Solutions

Stryker
Seniorfull-time$77k–$161k / yearCalifornia, Missouri, New Jersey, Texas, Washington · 🇺🇸 United States
Posted: 4 hours agoSource: stryker.wd1.myworkdayjobs.com
Geo Owl

Geospatial Analyst

Geo Owl
Mid · Seniorcontract🇺🇸 United States
Posted: 6 hours agoSource: geoowl.applytojob.com
Remote Sensing
GE HealthCare

Senior Analyst, Commercial Services

GE HealthCare
Seniorfull-time$114k–$172k / year🇺🇸 United States
Posted: 6 hours agoSource: gehc.wd5.myworkdayjobs.com
rockITdata

Service Desk Analyst

rockITdata
Mid · Seniorfull-time🇺🇸 United States
Posted: 7 hours agoSource: rockitdata.applytojob.com
AWSAzureCloud