About Marvell
Marvell’s semiconductor solutions are the essential building blocks of the data infrastructure that connects our world. Across enterprise, cloud and AI, automotive, and carrier architectures, our innovative technology is enabling new possibilities.
At Marvell, you can affect the arc of individual lives, lift the trajectory of entire industries, and fuel the transformative potential of tomorrow. For those looking to make their mark on purposeful and enduring innovation, above and beyond fleeting trends, Marvell is a place to thrive, learn, and lead.
Your Team, Your Impact
Joining Marvell as a CyberSecurity Analyst, you will be an expert at identifying and responding to threats against Marvell data and systems. The SOC is the central nervous system for the cybersecurity organization, a 24x7 service responsible for detection, assessing, and responding to security threats globally. You will be deeply engaged in the day-to-day operations that ensure we effectively detect and respond to evolving cyber threats using leading edge technology and robust processes.What You Can Expect
Provide primary triage, analysis and operational support for security events and alerts.Perform correlation using security analytics tools, log aggregators, advanced network malware protection, data indicator mining tools, forensics tools and threat intelligence repositories.Perform real-time incident handling (e.g., intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident ResponseParticipate in analyzing nature of the attack and root cause analysis of an incident.Monitor external data sources proactively to determine which security issues may have an impact on the enterprise.Document and publish techniques, guidance, and reports on incident findings to appropriate constituencies within Marvell.Participate in the improvement tasks such as but not limited to false positive reduction, use case refinement.Effectively communicate both verbal and written updates on alerts and incidentsWhat We're Looking For
4+ years' experience as a SOC Analyst preferably for a >5000 person enterprise.Experience in working with a geographically diverse team in multiple time zones around the globeStrong communication skills and an ability to adapt a message to audiences ranging from technology SMEs to company executives to stakeholders in every business discipline.Deep understanding of MITRE ATT&CK, with demonstrated experience building detection cases and playbooks around the tactics and techniques most relevant to your business.Proficient technical writing skills (documenting processes and procedures).Ability to solve problems and work through ambiguity and uncertainty.Proficiency with one or more DLP platformExperience working extensively with technologies such as IDS/IPS, NGFW, EDR, SIEM, HIDS/HIPS, AV, and Vulnerability Scanners.Expert level and continually expanding understanding of common and emerging security threats and vulnerabilitiesSelf-motivated and proven ability to deliver end-to-end solutions in a high-tech and fast-moving industry.Industry security certifications such as C|EH and relevant GIAC certifications or equivalent highly desirable.Experience with infrastructure operations and processes associated with IT service management in an Enterprise-level organization.Should be flexible and willing to work in rotational shifts.Additional Compensation and Benefit Elements
With competitive compensation and great benefits, you will enjoy our workstyle within an environment of shared collaboration, transparency, and inclusivity. We’re dedicated to giving our people the tools and resources they need to succeed in doing work that matters, and to grow and develop with us. For additional information on what it’s like to work at Marvell, visit our Careers page.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
#LI-CP1