Security Analyst, CSIRT

Australia - Sydney

Salesforce

Bieten Sie die beste Customer Experience mit einem einzigen CRM-Tool für Sales, Kundenservice, Marketing, Commerce & IT. Jetzt 30 Tage testen!

View all jobs at Salesforce

Apply now Apply later

To get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts.

Job Category

Enterprise Technology & Infrastructure

Job Details

About Salesforce

We’re Salesforce, the Customer Company, inspiring the future of business with AI+ Data +CRM. Leading with our core values, we help companies across every industry blaze new trails and connect with customers in a whole new way. And, we empower you to be a Trailblazer, too — driving your performance and career growth, charting new paths, and improving the state of the world. If you believe in business as the greatest platform for change and in companies doing well and doing good – you’ve come to the right place.

Salesforce has one of the best Information Security teams in the world and growing this piece of the business is a top priority! Our Information Security teams work hand in hand with the business to ensure the highest security around all of our applications and infrastructure. CSIRT is a geographically distributed team, responsible for 24x7x365 security monitoring and rapid incident response across all Salesforce environments. We are the ‘tip of the spear’ protecting company and customer data from our adversaries.

As a key member of our growing Global CSIRT, the Associate Incident Responder is on the ‘front lines’ of the Salesforce production environment; You will be contributing to CSIRT projects, conducting threat hunts and improving core CSIRT workflows and processes.

Working hours correspond to our “follow the sun” operating model and shift according to daylight savings during the year. Applicants must meet all visa requirements to work and live in Australia.

 

REQUIRED SKILLS:

Min 2 years of prior specialised security operations experience consisting of:

  • Flexibility, drive, integrity, and creative problem-solving skills

  • Operational experience with Endpoint Detection and Response (EDR) solutions i.e. Crowdstrike etc.

  • Operational experience with log analysis platforms i.e. Splunk, Google Security Operations, Kibana etc.

  • The ability to build strong relationships with peers both internal and external to your functional group, and with peers/professional organisations outside your company

  • Strong verbal and written communication skills; ability to communicate effectively and clearly to both technical and non-technical audiences

  • Familiarity with core concepts of security incident response, e.g., the typical phases of response, vulnerabilities vs threats vs actors, Indicators of Compromise (IoCs), etc.

  • Understanding of network fundamentals and common Internet protocols, specifically DNS, HTTP, HTTPS/TLS, and SMTP

  • Understanding of cloud security principles and experience with public cloud (e.g. AWS, Azure, or GCP)

  • Understanding of Mac OSX, Microsoft Windows, and Linux/Unix system administration and security control fundamentals

  • Strong interest in information security, including awareness of current threats and security best practices

  • Knowledge of email security threats and security controls, including analyzing email headers

DESIRED SKILLS:

  • Understanding of the information security threat landscape (attack vectors and tools, best practices for securing systems and networks, etc.)

  • Previous experience of collaborating with global teams

  • Working proficiency with programming /scripting languages is a plus: i.e. Python, Bash, Go, PowerShell

  • Relevant information security certifications, such as: BTL1, CERT CSIH, E-Council E|CIH, SANS GCIH, GCFA, GCFE, GX-IH, GX-FA and other related certifications

Accommodations

If you require assistance due to a disability applying for open positions please submit a request via this Accommodations Request Form.

Posting Statement

At Salesforce we believe that the business of business is to improve the state of our world. Each of us has a responsibility to drive Equality in our communities and workplaces. We are committed to creating a workforce that reflects society through inclusive programs and initiatives such as equal pay, employee resource groups, inclusive benefits, and more. Learn more about Equality at www.equality.com and explore our company benefits at www.salesforcebenefits.com.

Salesforce is an Equal Employment Opportunity and Affirmative Action Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender perception or identity, national origin, age, marital status, protected veteran status, or disability status. Salesforce does not accept unsolicited headhunter and agency resumes. Salesforce will not pay any third-party agency or company that does not have a signed agreement with Salesforce.

Salesforce welcomes all.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0
Category: Analyst Jobs

Tags: AWS Azure Bash CERT Cloud CrowdStrike CSIRT DNS EDR GCFA GCFE GCIH GCP Incident response Linux Log analysis Monitoring PowerShell Python SANS Scripting SMTP Splunk TLS UNIX Vulnerabilities Windows

Region: Asia/Pacific
Country: Australia

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.