Detection and Response Analyst
Plano, Texas, United States - Remote
Toyota Tsusho Systems
This is the official website of Toyota Tsusho Systems Corporation (TTS), the global ICT company of the Toyota Tsusho Group.As part of the Incident Detection team, Detection and Response Analyst will play an essential role in supporting our 24/7 Cyber Fusion Center, monitoring and responding to alerts to help prevent and mitigate cyberattacks. Detection and Response Analyst conducts in-depth analysis of security events and requires the ability to identify indicators of compromise (IOCs), perform intrusion and root cause analysis, and proactively take actions to mitigate potential damage to our cyber ecosystem.
Essential Functions:
• Work in 24x7 Cyber Fusion Center to provide monitoring and detection/response services. Work various 10-hour shifts, including weekends and work both day and night shifts. Shifts rotate quarterly.
• Leverage SIEM to query logs and correlate across multiple log sources.
• Detect and respond to security incidents by leveraging detection/response platforms.
• Triage security incidents and perform in-depth analysis using cyber threat intelligence, intrusion detection systems, firewalls and other boundary protection devices.
• Escalates cybersecurity events according to playbooks and standard operation procedures (SOPs).
• Support Incident Response efforts as needed, including providing counsel, working with the IR team, as well as other involved stakeholders within the organization and customers to drive forward remediation activities.
• Assist with containment and remediation of threats during incidents. Use internal ticketing system to track investigated incidents and capture relevant details.
• Conduct threat hunting activities based on internal and external threat intelligence.
• Assist with service requests from customers and internal teams.
• Identify, recommend, coordinate, and deliver timely knowledge to support teams.
• Report all information to the supervisor and upper management with updates as requested and respond to requests for information and assistance, including project progress and problems, particularly as needed to change in schedule, resources and scopes
• Contribute to the creation of documentation to standardize processes and procedures, including playbooks to improve internal processes and procedures.
• Work with team to establish repeatable and constantly improving processes.
• Serve as mentor and provide training to other team members as needed.
• Other tasks and responsibilities as assigned by leadership.
Requirements
Required Education and Experience:
• At least 3 years of cybersecurity experience with a focus on Incident Detection, Incident Response and/or Security Operations.
• BA/BS in Computer Science, Information Security, or Information Systems or equivalent related work experience.
• Experience interfacing with internal and external customers, providing remediation actions to non-technical audiences.
• Working knowledge of enterprise-level security technologies such as SIEM and ticketing systems.
• Experience in a highly collaborative environment with a focus on project delivery and desired business outcomes.
• Experience with SIEM platforms, enterprise intrusion prevention systems, endpoint detection and response tools, and other security products.
• Experience supporting large scale incident investigations.
• Experience interfacing with a variety of cybersecurity teams (such as red team, cyber threat intelligence, data loss prevention, etc).
• Security certifications such as: Security+, CYSA+, CASP+, GCFA, GCIH, GCFE
Competencies:
• Strong technical background in security, network, infrastructure, cloud, applications.
• Knowledge of risk assessment tools, technologies, and methods.
• Firm grasp of networking and hacking concepts.
• Expertise in designing secure networks, systems, and application architectures.
• Knowledge around common web application attacks including SQL injection, cross-site scripting, invalid inputs, and forceful browsing.
• Proficient knowledge of how common protocols & applications work at the network level, including DNS, HTTP, and SMB.
• Proficient with SIEM technologies (Security Information and Event Management e.g., Splunk/MS sentinel or other SIEM TOOL).
• Detail-orientated and analytical skills.
• Problem-solving skills
• Proficient with Microsoft Office & documentation skills (Word, Excel, PowerPoint)
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CASP+ Cloud Computer Science DNS EDR Firewalls GCFA GCFE GCIH Incident response Intrusion detection Intrusion prevention Monitoring Red team Risk assessment Scripting Sentinel SIEM Splunk SQL SQL injection Threat intelligence XSS
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.