Information Security Operations Analyst
Thornhill, Toronto
Extreme Networks
We provide networking solutions to power your business. Our flexible and scalable cloud networking services help optimize your network infrastructure.
Over 50,000 customers globally trust our end-to-end, cloud-driven networking solutions. They rely on our top-rated services and support to accelerate their digital transformation efforts and deliver unprecedented progress. With double-digit growth year over year, no provider is better positioned to deliver scalable outcomes than Extreme.
Inclusion is one of our core values and in our DNA. We are committed to fostering an inclusive workplace that embraces our differences and creates an atmosphere where all our employees thrive because of their differences, not in spite of them.
Become part of Something big with Extreme! As a global networking leader, learn why there’s no better time to join the Extreme team.
As a key member of the Information Security Operations team, you will be primarily responsible for the monitoring & responding to security events & tickets; investigating root cause analysis of issues and updating and investigating threat feeds and alerts; and management and operation of the SIEM (Security Information and Event Management) solution. In addition to the above tasks, you will support the wider information security and IT teams as appropriate on additional requests.The successful candidate should have a mind set to challenge existing processes, always looking for better ways to achieve the team and business goals through more efficient or updated processes.As part of the Information Security Operations Team, this role will include on-call work over a weekend on an agreed rotation. Job Requirements:· The job requirements include but are not limited to the following tasks.· Continuously monitor SIEM Console, ServiceNow incident queues and SecOps dashboards for alerts, tickets, and issues.· Notify system owners and Escalate security incidents per the incident response escalation procedures.· SIEM Alert tuning and configuration.· Monitor devices system performance, system resources utilization (disk space, indexed data) and health monitoring.· Add, configure new log, and event sources into SecOp’s tools.· Fine tuning and policy enhancement for SIEM and other SecOp’s tools.· Responsible for troubleshooting SIEM and SOC (Security Operations Center) operational related issues.· Assist in case of major outbreak or any critical incident related issue.· The Incident response team will perform a deep dive incidents analysis by correlating data from various sources.· Respond to all reported security incidents.· Follow up with teams for incident closure. · Maintain incident records as per the guidelines.· Capture and protect the evidence related to an incident.· Review and interpret new IoC threats for applicability.· Deep-dive investigations including traffic & malware analysis.· Perform incident damage assessment.· Update stakeholders about security incidents progress.· Strong interpersonal communication skills.· Good verbal and written communication skills.· Ability to analyze problems and create solutions to Maintain confidentiality of information.· Must be able to prioritize projects, maintaining a sense of urgency to meet deadlines.· Must possess the ability to follow verbal and written directions.· Must be a self-starter and able to work well in independently and in Team.· Must be able to use critical thinking skills and judgment.· Must be able to work positively and professionally with a wide range of personalities.· Must be able to accept constructive criticism. Working Schedule The standard working schedule for this role will be Monday-Friday 40hr week. In addition to the standard working week, on a rotational basis, the successful candidate will be required to be on-call for critical alerts on a Saturday & Sunday (or other non-working days) Experience· Ideal candidates will have background / experience in security operations. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. · The ideal candidate should be able to work autonomously and be self-motivated.· The ideal candidate will have experience using / performing searches and tuning a SIEM product.· The ideal candidate will have experience with the Microsoft suite of security tools.· The ideal candidate will have experience in using security incident response frameworks & Mitre framework.· The requirements listed above are representative of the knowledge, skill and/or ability required. · Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.Extreme Networks, Inc. (EXTR) creates effortless networking experiences that enable all of us to advance. We push the boundaries of technology leveraging the powers of machine learning, artificial intelligence, analytics, and automation. Over 50,000 customers globally trust our end-to-end, cloud-driven networking solutions and rely on our top-rated services and support to accelerate their digital transformation efforts and deliver progress like never before. For more information, visit Extreme's website or follow us on Twitter, LinkedIn, and Facebook.
We encourage people from underrepresented groups to apply. Come Advance with us! In keeping with our values, no employee or applicant will face discrimination/harassment based on: race, color, ancestry, national origin, religion, age, gender, marital domestic partner status, sexual orientation, gender identity, disability status, or veteran status. Above and beyond discrimination/harassment based on “protected categories,” Extreme Networks also strives to prevent other, subtler forms of inappropriate behavior (e.g., stereotyping) from ever gaining a foothold in our organization. Whether blatant or hidden, barriers to success have no place at Extreme Networks.
Inclusion is one of our core values and in our DNA. We are committed to fostering an inclusive workplace that embraces our differences and creates an atmosphere where all our employees thrive because of their differences, not in spite of them.
Become part of Something big with Extreme! As a global networking leader, learn why there’s no better time to join the Extreme team.
As a key member of the Information Security Operations team, you will be primarily responsible for the monitoring & responding to security events & tickets; investigating root cause analysis of issues and updating and investigating threat feeds and alerts; and management and operation of the SIEM (Security Information and Event Management) solution. In addition to the above tasks, you will support the wider information security and IT teams as appropriate on additional requests.The successful candidate should have a mind set to challenge existing processes, always looking for better ways to achieve the team and business goals through more efficient or updated processes.As part of the Information Security Operations Team, this role will include on-call work over a weekend on an agreed rotation. Job Requirements:· The job requirements include but are not limited to the following tasks.· Continuously monitor SIEM Console, ServiceNow incident queues and SecOps dashboards for alerts, tickets, and issues.· Notify system owners and Escalate security incidents per the incident response escalation procedures.· SIEM Alert tuning and configuration.· Monitor devices system performance, system resources utilization (disk space, indexed data) and health monitoring.· Add, configure new log, and event sources into SecOp’s tools.· Fine tuning and policy enhancement for SIEM and other SecOp’s tools.· Responsible for troubleshooting SIEM and SOC (Security Operations Center) operational related issues.· Assist in case of major outbreak or any critical incident related issue.· The Incident response team will perform a deep dive incidents analysis by correlating data from various sources.· Respond to all reported security incidents.· Follow up with teams for incident closure. · Maintain incident records as per the guidelines.· Capture and protect the evidence related to an incident.· Review and interpret new IoC threats for applicability.· Deep-dive investigations including traffic & malware analysis.· Perform incident damage assessment.· Update stakeholders about security incidents progress.· Strong interpersonal communication skills.· Good verbal and written communication skills.· Ability to analyze problems and create solutions to Maintain confidentiality of information.· Must be able to prioritize projects, maintaining a sense of urgency to meet deadlines.· Must possess the ability to follow verbal and written directions.· Must be a self-starter and able to work well in independently and in Team.· Must be able to use critical thinking skills and judgment.· Must be able to work positively and professionally with a wide range of personalities.· Must be able to accept constructive criticism. Working Schedule The standard working schedule for this role will be Monday-Friday 40hr week. In addition to the standard working week, on a rotational basis, the successful candidate will be required to be on-call for critical alerts on a Saturday & Sunday (or other non-working days) Experience· Ideal candidates will have background / experience in security operations. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. · The ideal candidate should be able to work autonomously and be self-motivated.· The ideal candidate will have experience using / performing searches and tuning a SIEM product.· The ideal candidate will have experience with the Microsoft suite of security tools.· The ideal candidate will have experience in using security incident response frameworks & Mitre framework.· The requirements listed above are representative of the knowledge, skill and/or ability required. · Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.Extreme Networks, Inc. (EXTR) creates effortless networking experiences that enable all of us to advance. We push the boundaries of technology leveraging the powers of machine learning, artificial intelligence, analytics, and automation. Over 50,000 customers globally trust our end-to-end, cloud-driven networking solutions and rely on our top-rated services and support to accelerate their digital transformation efforts and deliver progress like never before. For more information, visit Extreme's website or follow us on Twitter, LinkedIn, and Facebook.
We encourage people from underrepresented groups to apply. Come Advance with us! In keeping with our values, no employee or applicant will face discrimination/harassment based on: race, color, ancestry, national origin, religion, age, gender, marital domestic partner status, sexual orientation, gender identity, disability status, or veteran status. Above and beyond discrimination/harassment based on “protected categories,” Extreme Networks also strives to prevent other, subtler forms of inappropriate behavior (e.g., stereotyping) from ever gaining a foothold in our organization. Whether blatant or hidden, barriers to success have no place at Extreme Networks.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Categories:
Analyst Jobs
Incident Response Jobs
Tags: Analytics Artificial Intelligence Automation Cloud Incident response Machine Learning Malware Monitoring SecOps SIEM SOC
Perks/benefits: Career development Team events
Region:
North America
Country:
Canada
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information System Security Officer jobsInformation Security Specialist jobsSenior Security Analyst jobsSenior Cloud Security Engineer jobsSenior Cybersecurity Engineer jobsSystems Engineer jobsSystems Administrator jobsSenior Information Security Analyst jobsInformation Security Manager jobsSenior Network Security Engineer jobsCyber Security Specialist jobsIT Security Analyst jobsIT Security Engineer jobsSecurity Consultant jobsChief Information Security Officer jobsSecurity Specialist jobsInformation System Security Officer (ISSO) jobsInformation Systems Security Engineer jobsSenior Cyber Security Engineer jobsSenior Product Security Engineer jobsSenior Information Security Engineer jobsCyber Threat Intelligence Analyst jobsSecurity Operations Analyst jobsCyber Security Architect jobsCybersecurity Specialist jobs
Encryption jobsJava jobsEDR jobsTS/SCI jobsBash jobsThreat detection jobsSplunk jobsIDS jobsSQL jobsMalware jobsTerraform jobsIPS jobsSDLC jobsTop Secret jobsRMF jobsFinance jobsSOC 2 jobsForensics jobsDocker jobsCompTIA jobsActive Directory jobsGIAC jobsOWASP jobsIntrusion detection jobsVPN jobs
ITIL jobsDoDD 8570 jobsAnsible jobsHIPAA jobsIT infrastructure jobsTCP/IP jobsData Analytics jobsOSCP jobsCRISC jobsClearance Required jobsUNIX jobsMITRE ATT&CK jobsCCSP jobsBanking jobsZero Trust jobsNIST 800-53 jobsSAP jobsSOAR jobsDNS jobsEndpoint security jobsSOX jobsMachine Learning jobsIndustrial jobsJavaScript jobsSecurity strategy jobs