Match score not available

Career Opportunities: INFORMATION SECURITY ANALYST II - Remote (126065)

Remote: 
Full Remote
Contract: 
Salary: 
86 - 130K yearly
Experience: 
Mid-level (2-5 years)
Work from: 

Offer summary

Qualifications:

3-5 years of relevant experience, Degree or certificate preferred.

Key responsabilities:

  • Conduct advanced cyber incident analysis
  • Manage security tools and threat hunting
  • Analyze malware and provide incident reports
  • Collaborate with Tier 1 Analysts
  • Develop SIEM SOAR playbooks and procedures
TE Connectivity logo
TE Connectivity
10001 Employees
See more TE Connectivity offers

Job description

 

Job Posting Title: INFORMATION SECURITY ANALYST II - Remote  
Job ID: 126065 
Job Code: 30003834    
Business Unit: GLOBAL TEIS (10000003)  
Building: Non-TE facility (902)  
Band/Level: 5  
Hiring Manager: VLADIMIR REBEK 
Recruiter: Dana Liddell-Cofield   
Relocation: No  
Travel: Less than 10%  
Employee Referral Amount: $1,000.00  
Education Experience: Other  
Employment Experience: 3-5 years  


At TE, you will unleash your potential working with people from diverse backgrounds and industries to create a safer, sustainable and more connected world. 


 

Job Overview

Tier 2 Analysts play a crucial role in enhancing the organization's cybersecurity capabilities by responding to and containing more sophisticated threats. 
This role provides support to other tiers and external teams, serves as the escalation point for Tier-1 analysts, ability to respond/investigate without a defined playbook or process. This role has Intermediate to Advanced understanding of TE’s security toolset.

 

  • Tier 2 Analyst understands and can perform Tier 1 Analyst’s functions (all of the above) as needed – At minimum critical monitoring and associated analysis as needed.
  • Advanced Cyber Incident Analysis: Conduct in-depth analysis of security incidents that have been escalated from Tier 1. This involves a deeper examination of the nature and scope of the incident, as well as identifying any advanced tactics, techniques, and procedures (TTPs) used by attackers.
  • Incident Containment: Work on containing and mitigating security incidents. Implement strategies to limit the impact of an incident and prevent it from spreading further within the organization's network.
  • In Depth Analysis: Perform advanced analysis on compromised systems to understand the root cause of incidents, identify the extent of the compromise, and gather evidence for investigations.
  • Malware Analysis: Analyze and dissect malicious software to understand its functionality, behavior, and potential impact on systems. This involves using tools and techniques to reverse engineer malware.
  • Security Tool Management: Manage and fine-tune security tools such as intrusion detection and prevention systems, endpoint protection, and security information and event management (SIEM) systems to enhance their effectiveness.
  • Incident Reporting: Generate detailed incident reports documenting the findings, analysis, and remediation steps taken during incident response. Communicate findings to higher-level teams, management, and relevant stakeholders.
  • Collaboration with Tier 1 Analysts: Collaborate with Tier 1 Analysts to provide guidance, training, and support. Share insights and lessons learned to enhance the skills of less experienced team members.
  • Threat Hunting: Proactively search for signs of advanced threats within the organization's network. This involves using threat intelligence and other resources to identify potential security risks before they escalate.

 

Responsibilities

 

  • Intermediate Malware Analysis 
  • Threat hunting (SIEM, EDR, etc) 
  • As needed - Monitor Security Alerts/Critical Monitoring (SIEM, SOAR, EDR, Inbox, SNOW) 
  • Threat Intelligence Collections 
  • Threat Intelligence Alert Monitoring 
  • Threat Intelligence Sources Dissemination 
  • Breach Monitoring and Reporting 
  • Threat Informed Defense Alerting - Monitoring and Analysis, perform response coordination & closure to ensure issues have been appropriately addressed 
  • Threat Response Coordinator - Provide notifications to stakeholders on key issues 
  • Reportable Incident Validation  
  • Potential Incident Analysis Investigations 
  • SIEM SOAR Playbooks Design - Document / create playbooks and procedures for Tier-1 analysts when gap areas are identified, or new detections are created. Identify areas of improvement & automation 
  • Programming, Queries & Scripting - Implement or work with escalation analysts/engineers to build detection & prevention mechanisms
What your background should look like:
  • Experience:  3-5 years of similar technical experience
  • Education: degree or certificate preferred
Competencies
Values: Integrity, Accountability, Inclusion, Innovation, Teamwork

COMPENSATION
•    Competitive base salary commensurate with experience: $86,300 – $129,500 (subject to change dependent on physical location)
•    Posted salary ranges are made in good faith. TE Connectivity reserves the right to adjust ranges depending on the experience/qualification of the selected candidate as well as internal and external equity.
•    Total Compensation = Base Salary + Incentive(s) + Benefits
BENEFITS
•    A comprehensive benefits package including health insurance, 401(k), disability, life insurance, employee stock purchase plan, paid time off and voluntary benefits.

EOE, Including Disability/Vets

 

Required profile

Experience

Level of experience: Mid-level (2-5 years)
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Incident Reporting
  • Problem Solving
  • Collaboration
  • Analytical Thinking
  • Verbal Communication Skills

Information Security Analyst Related jobs