India
64 days ago
42514P-Information Security Analyst 4

Your Role 

  

The Juniper Cyber Fusion is looking for a certified security professional to join our highly collaborative, and diverse team of talent. Our mission is to provide operationally excellent next-generation information security event monitoring, threat hunting, and incident response services that protect Juniper’s intellectual property (IP) and infrastructure from adverse cyber events. As an Information Security Analyst, you will report to the Threat Fusion & Response Director. In this role you will utilize industry leading technology to detect, respond, and recover from advanced attacks and apply root cause analysis and lessons learned to proactively protect against known adversary tactics, techniques, and procedures, prevent impact of Juniper’s assets, and control recurrence of incidents. 

  

Your Work 

  

In this role, you will: 

Provide advanced network intrusion monitoring and response.  This will include performing security incident risk assessment and severity declaration.   Perform expert level endpoint detection and response (EDR)  Analyze application and web security events  Interpret logs for expert level threat hunting to identify and respond to indicators of compromise (IOCs) and threats including User and Event Behavioral Analytics (UEBA) using a security information and event management (SIEM) environment  Perform incident response containment  Help develop and utilize a Security Orchestration, Automation, and Response (SOAR) of information security incidents – currently using Service Now.  Respond and facilitate expert level tier-3 incident management; mobilize security incident response team (CIRT) of key stakeholders; communicate and notify at all levels of the organization; perform post-incident activity involving root cause analysis (RCA) and lesson learned assessments and identify owners of correction action plans (CAP)  Formulation of security operation incident response plan, operational procedures, desk level procedures, and operational level agreements  Yield security compliance evidence 

 
Your Knowledge and Experience 
 

A degree/certification in in the information security field OR  a minimum of 7-10 years dedicated to IT, information security, and/or security infrastructure experience OR a combination of equivalent work experience and education  Certification(s) demonstrating a core competency in the area of Information Security Incident Handling and threat hunting 

  

Technical 

Security Incident Handling & Response  Security information event management (SIEM) searching  Data analytics  Intrusion detection and network tools; Wireshark, Nmap  Web proxies  Cloud access security broker (CASB)  VMware and virtualization platforms  Database activity monitoring  Application security  Anti-virus and malware detection  Social engineering and phishing detection  Identity & Access Management  Host-base forensics  Threat hunting 

  

Soft Skills 

Effective verbal and non-verbal communication skills at all levels of the organization  Leadership teamwork and collaboration  Trustworthiness and discretion  Problem solving  Critical Thinking  Self-initiated/sufficient  Motivated 

 

 

Our Values 

Be Bold: Explore Fearlessly, Pursue Simplicity, Seek Diverse Idea  

Build Trust: Own It, Create Customer Success, Champion Authenticity  

Diver Excellence: Obsess About Quality, Act With Urgency, Improve Relentlessly   

 

Confirm your E-mail: Send Email