Cyber Security Monitoring Infrastructure Architect, Rakuten-CERT Section - Cyber Security Defense Department (CSDD)

Rakuten Crimson House, Japan

Rakuten

楽天グループ株式会社のコーポレートサイトです。企業情報や投資家情報、プレスリリース、サステナビリティ情報、採用情報などを掲載しています。楽天グループは、イノベーションを通じて、人々と社会をエンパワーメントすることを目指しています。

View all jobs at Rakuten

Apply now Apply later

Job Description:

Department Overview

In Rakuten Group, the security and safety of the Internet services are guaranteed by the Cyber Security Defense Department (CSDD). CSDD covers all aspects of the System Development Life Cycle we (SDLC) and operation security for all the services developed inside Rakuten Group.


Position:

Why We Hire

Team expansion due to the increased demand for the work and the scope expansion.


Position Details

As a member of the CSDD, you will be responsible for the high-level design, implementation, and maintenance of cyber security monitoring systems. This role requires a deep understanding of SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), and other core technologies, as well as cyber security landscape, attack tools, tactics and procedures. You will work closely with various teams to ensure that our monitoring solutions align with business needs, address cyber security challenges, and maintain high availability and operational efficiency.


Responsibilities

- Understand business requirements and define security monitoring requirements accordingly.

- Design and architect comprehensive cyber security monitoring systems utilizing SIEM, SOAR, and other relevant technologies based on the the criticality and risk of the business function.

- Implement and configure monitoring systems to meet organizational security requirements.

- Maintain and enhance the operational efficiency of monitoring systems, ensuring high availability and performance.

- Troubleshoot and resolve issues related to monitoring infrastructure.

- Integrate on-premise and cloud-based solutions to create a cohesive monitoring environment.

- Collaborate with other cyber security teams to ensure seamless integration and operation of monitoring systems.

- Develop and maintain documentation for system architecture, configurations, and operational procedures.

- Stay current with emerging technologies and industry best practices to continuously improve the monitoring infrastructure.

- Engage with stakeholders to understand business objectives and align monitoring solutions with organizational goals.

- Provide insights and recommendations to improve the overall security posture based on monitoring data and trends.

- Understand and apply frameworks such as MITRE ATT&CK to identify and mitigate common cyber security attack TTPs (Tactics, Techniques, and Procedures).

- Prepare and present detailed reports and presentations to stakeholders, explaining technical concepts, findings, and recommendations in a clear and concise manner.

- Provide incident response (IR) support as needed.

- Continuous improvement in monitoring to with low false positives and false negatives.


Mandatory Qualifications:

- 8+ years of experience in Cybersecurity related fields.

- Proven experience in designing, implementing, and maintaining SIEM and SOAR systems.

- Strong understanding of cyber security principles, challenges, and best practices.

- Experience with both on-premise and cloud-based security solutions and integrations.

- Proficiency in troubleshooting and resolving technical issues related to monitoring systems.

- Excellent communication and collaboration skills, with the ability to articulate technical concepts to non-technical stakeholders.

- Strong leadership skills and teamwork capability in a diverse team environment.

- Strong verbal and written communications skills.

- Strong ownership and sense of responsibility.

- Knowledge of frameworks such as MITRE ATT&CK and common cyber security attack TTPs.

- Excellent documentation and presentation skills, with the ability to create and deliver detailed reports and presentations to various stakeholders.

- Good knowledge of API integrations required for log sources connectivity to -- SIEM and SOAR platforms, as well as back-end integrations like Syslogs and Logstash for the SIEM infrastructure.

- Knowledge of performing Threat Modeling to understand potential risks.


Desired Qualifications:

- Experience with specific SIEM and SOAR platforms (e.g., Splunk, IBM QRadar, Palo Alto Cortex XSOAR).

- Knowledge of scripting and automation tools (e.g., Python, PowerShell).

- Familiarity with network security, endpoint security, and threat intelligence.

- Experience using major commercial cloud environments such as AWS/Azure/GCP, and knowledge of cloud security and infrastructure such as Infrastructure as Code (IaC), containers (Docker), and orchestration (Kubernetes).

- Experience handling escalated cases from Security Operation Center (SOC).

- Incident Response (IR) experience.

- Ability to communicate in Japanese

#engineer
#securityengineer
#technologymanagementdiv  

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0
Category: Architecture Jobs

Tags: APIs Automation AWS Azure CERT Cloud Docker Endpoint security GCP Incident response Kubernetes MITRE ATT&CK Monitoring Network security PowerShell Python QRadar Scripting SDLC SIEM SOAR SOC Splunk Threat intelligence TTPs XSOAR

Region: Asia/Pacific
Country: Japan

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.