Your Role
The Juniper Cyber Fusion is looking for a certified security professional to join our highly collaborative, and diverse team of talent. Our mission is to provide operationally excellent next-generation information security event monitoring, threat hunting, and incident response services that protect Juniper’s intellectual property (IP) and infrastructure from adverse cyber events. As an Information Security Analyst, you will report to the Threat Fusion & Response Director. In this role you will utilize industry leading technology to detect, respond, and recover from advanced attacks and apply root cause analysis and lessons learned to proactively protect against known adversary tactics, techniques, and procedures, prevent impact of Juniper’s assets, and control recurrence of incidents.
Your Work
In this role, you will:
Provide advanced network intrusion monitoring and response. This will include performing security incident risk assessment and severity declaration. Perform expert level endpoint detection and response (EDR) Analyze application and web security events Interpret logs for expert level threat hunting to identify and respond to indicators of compromise (IOCs) and threats including User and Event Behavioral Analytics (UEBA) using a security information and event management (SIEM) environment Perform incident response containment Help develop and utilize a Security Orchestration, Automation, and Response (SOAR) of information security incidents – currently using Service Now. Respond and facilitate expert level tier-3 incident management; mobilize security incident response team (CIRT) of key stakeholders; communicate and notify at all levels of the organization; perform post-incident activity involving root cause analysis (RCA) and lesson learned assessments and identify owners of correction action plans (CAP) Formulation of security operation incident response plan, operational procedures, desk level procedures, and operational level agreements Yield security compliance evidence
Your Knowledge and Experience
Technical
Security Incident Handling & Response Security information event management (SIEM) searching Data analytics Intrusion detection and network tools; Wireshark, Nmap Web proxies Cloud access security broker (CASB) VMware and virtualization platforms Database activity monitoring Application security Anti-virus and malware detection Social engineering and phishing detection Identity & Access Management Host-base forensics Threat hunting
Soft Skills
Effective verbal and non-verbal communication skills at all levels of the organization Leadership teamwork and collaboration Trustworthiness and discretion Problem solving Critical Thinking Self-initiated/sufficient Motivated
Our Values
Be Bold: Explore Fearlessly, Pursue Simplicity, Seek Diverse Idea
Build Trust: Own It, Create Customer Success, Champion Authenticity
Diver Excellence: Obsess About Quality, Act With Urgency, Improve Relentlessly