Dell provides the technology that transforms the way we all work and live. But we are more than a technology company — we are a people company. We inspire, challenge and respect every one of our over 100,000 employees. We also provide them with unparalleled growth and development opportunities to our customers, including job opportunities. We can’t wait for you to join our team of experts as a Cyber Security Analyst and support one of our enterprise customers in their journey.
Job description and responsibilities:
Leading monitoring and investigation activities of the SOC team for information security and cyber incidents
Organizing investigation processes, writing procedures and continuous improvement for the SOC processes
Implementing proactive investigations (Threat Hunting) and providing a full response to cyber incidents (IR)
Collaboration and characterization of needs with the SecOps team for continuous improvement of the SIEM and SOAR systems
Promoting projects and examining information security products (PoC) to improve the monitoring and response of the SOC team
Monitoring activities and response to cyber intelligence reports from information security systems and diverse intelligence services
Leading the SOC activity with internal (communications, infrastructure, development, cloud, etc.) and external stakeholders
Requirements:
At least 3 years of experience in information and cyber security (required)
Experience with information security systems including - Firewall, NAC, DLP, WAF, Proxy, Email Security Gateway, Threat Intelligence Platforms, SOAR, SIEM, Sandbox, EDR
Use of investigative methodologies for information security and cyber incidents such as NIST and SANS
Experience in Threat Hunting for the purpose of identifying information security gaps and reducing the attack options in the organization
Leading investigations, identifying and providing instructions and/or responding to end-to-end incidents until the threat is removed from the organization
Characterization of investigation processes based on Playbooks and automations to reduce detection and response times to incidents
Familiarity with identifying tactics, techniques, and attack processes (TTP's)
Implementing forensic investigations and/or use of IR tools - an advantage
Certification in the field such as: CompTIA Security+, CompTIA CySA+, CISM - an advantage
Highly motivated and interpersonal skillset, management skills, working as team member and analytical thinking