Logo
Getronics

Senior Cybersecurity Detection Analyst Job at Getronics in Town of Italy

Getronics, Town of Italy, NY, United States

Save Job

At Getronics we are looking to expand our IT Security team by incorporating a Cybersecurity Detection Analyst in remote mode during office hours although if you live in Barcelona or surroundings it would be great as our SOC is located there (not a must).

The person joining will help us build on the existing ATT & CK based managed manual for the Getronics Security Operations Center and develop it to the next level of maturity and capability. In addition, you will support us with the day-to-day threat detection work of a team of analysts serving a wide range of customers in different industries, as well as Getronics’ private and hybrid cloud services and internal IT.

Requirements

  • Minimum two years of experience as Cybersecurity Detection Analyst and working with SIEM technology (QRadar, LogRhythm, Splunk Elastic Security, InsightsIDR, AlienVault OSSIM, etc.).
  • Previous experience in other cybersecurity technical areas, SOC Analyst, Cyber Intelligence Technical Analyst, pentester, etc.
  • Experience with hands-on implementation of detection playbooks based on the MITRE ATT&CK framework.
  • Experience as a problem solver and analytical thinker.
  • Experience and solid understanding of the information security threat landscape, such as attack vectors and best practices to protect systems and networks.
  • Experience and / or advanced knowledge with at least two of the following technologies – Python, RegEx, Sigma and YARA.
  • Experience with performance tuning correlation rules.
  • Strong communication skills, ability to summarize well and write clear documentation.
  • Fluent English, written and spoken as you will have international level interlocutions.
  • Structured and results oriented way of working.

One or more of the following would be an asset, although not essential :

  • Strong understanding of common logging and analysis formats, including cloud technologies.
  • Experience with MITRE D3FEND
  • Solid understanding of the cyber threat landscape.
  • Desirable certifications / training : SANS SEC511 continuous monitoring (GIAC GMON certification), SIEM certifications (any fabricant), Cloud certifications (AWS, Azure, other).
  • Engineering / Master’s degree in Computer Science or Security, etc.

Functions

  • Develop threat detection rules to identify modern attacker techniques and tactics in close collaboration with threat intelligence, incident response, security analysts, security architects and infrastructure teams.
  • Maintain the existing rule base to ensure effectiveness and efficiency and apply lifecycle management to extinguishment rules where appropriate
  • Evaluate coverage against the ATT&CK framework to identify gaps and opportunities for improvement
  • Develop and maintain effective metrics
  • Support on-demand compliance use cases
  • Identify need, create and maintain lists as needed to support correlation rules
  • Create dashboards to support specific use cases for threat detection and train analysts in their use
  • Provide guidance to threat search activities, by developing efficient search queries
  • Develop detection strategies for existing and emerging business needs in collaboration with business and IT teams
  • Analyzing alert trends to drive improvement
  • Maintaining and improving data collection and co management frameworks and documentation
#J-18808-Ljbffr