Information Security Analyst - Information Technology (Brno Office, Czech Republic)
Brno - Tech Park Brno - B
Red Hat
Red Hat is the world’s leading provider of enterprise open source solutions, including high-performing Linux, cloud, container, and Kubernetes technologies.Red Hat's Information Technology division is seeking an Information Security Analyst to join us in Brno, Czech Republic. In this role, you will join the smart, skilled, and dedicated people that make up Red Hat's Global Information Risk and Security team. This role provides a unique opportunity for you to draw on and develop your corporate information security and operations knowledge to meet the challenges of securing Red Hat, the open source way. You'll maintain a current knowledge of the information security industry to help you evaluate, recommend, and implement security controls to prevent and detect information security incidents. Excellent communication skills are a must, as you consult with a wide range of customers and stakeholders. You will research and respond to potential information security incidents, advise other Red Hatters on the security aspects of projects, and collaborate to deliver corporate information security enhancements, thereby contributing to Red Hat's overall success. Special skills you can bring in the areas of systems administration, networking, log analysis, cloud technologies, and data forensics are a plus, as you help keep all of Red Hat's information systems safe: from endpoints, to the data center, to the cloud.
What you will do
- Work to understand and improve Red Hat's information security posture
- Contribute to the success of information security initiatives from creation to delivery, through individual and team projects
- Implement automated detection and alerting for potential security incidents - Perform information security incident handling and respond to customer inquiries
- Provide security consulting, awareness and outreach to all areas of the business
- Stay current with information security developments (such as vulnerabilities, threat activity, attacker techniques and countermeasures) and apply these in an enterprise context
What you will bring
- Excellent analytical and problem solving skills, a passion for information security, and enthusiasm for working with open source technologies
- 2+ years experience in a technical or operational role, with exposure to information security topics
- Proven history of working in a position of trust
- Ability to work effectively and collaborate within a global, diverse, multicultural team
- Excellent customer service and communication skills, both written and verbal, to convey information effectively and professionally to a wide variety of audiences
- A methodical, data-driven approach to security analysis and the ability to think laterally and creatively in order to detect and respond to incidents, as well as implement pragmatic security improvements
- Solid experience with some of the major operating systems and a familiarity with their security features, maintenance and hardening
- Familiarity with large-scale log analysis platforms (such as Splunk) and an understanding of statistical methods would be an advantage
- Experience using a scripting language (such as Python, Perl or Shell) to automate solutions
- Information security tertiary education or industry certifications (such as RHCE, CISSP, GSEC, GCIH, GCIA, OSCP, CCNA etc.) would be highly regarded.
About Red Hat
Red Hat is the world’s leading provider of enterprise open source software solutions, using a community-powered approach to deliver high-performing Linux, cloud, container, and Kubernetes technologies. Spread across 40+ countries, our associates work flexibly across work environments, from in-office, to office-flex, to fully remote, depending on the requirements of their role. Red Hatters are encouraged to bring their best ideas, no matter their title or tenure. We're a leader in open source because of our open and inclusive environment. We hire creative, passionate people ready to contribute their ideas, help solve complex problems, and make an impact.
Diversity, Equity & Inclusion at Red Hat
Red Hat’s culture is built on the open source principles of transparency, collaboration, and inclusion, where the best ideas can come from anywhere and anyone. When this is realized, it empowers people from diverse backgrounds, perspectives, and experiences to come together to share ideas, challenge the status quo, and drive innovation. Our aspiration is that everyone experiences this culture with equal opportunity and access, and that all voices are not only heard but also celebrated. We hope you will join our celebration, and we welcome and encourage applicants from all the beautiful dimensions of diversity that compose our global village.
Equal Opportunity Policy (EEO)
Red Hat is proud to be an equal opportunity workplace and an affirmative action employer. We review applications for employment without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, ancestry, citizenship, age, veteran status, genetic information, physical or mental disability, medical condition, marital status, or any other basis prohibited by law.
Red Hat does not seek or accept unsolicited resumes or CVs from recruitment agencies. We are not responsible for, and will not pay, any fees, commissions, or any other payment related to unsolicited resumes or CVs except as required in a written contract between Red Hat and the recruitment agency or party requesting payment of a fee.
Red Hat supports individuals with disabilities and provides reasonable accommodations to job applicants. If you need assistance completing our online job application, email application-assistance@redhat.com. General inquiries, such as those regarding the status of a job application, will not receive a reply.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CISSP Cloud Forensics GCIA GCIH GSEC Kubernetes Linux Log analysis Open Source OSCP Perl Python Red Hat Scripting Security analysis Splunk Vulnerabilities
Perks/benefits: Transparency
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.