Information Security Analyst - SecOps

G-P Logo

G-P

๐Ÿ“Remote - India

Summary

Join G-P's diverse, remote-first team as an Information Security Analyst - SecOps and play a crucial role in securing our infrastructure and protecting our global platform. You will investigate security alerts, conduct incident response activities, develop remediation plans, and provide security expertise to the team. This role involves monitoring AWS environments, conducting security reviews, and recommending improvements to our security posture. You will collaborate with stakeholders, analyze emerging threats, and contribute to the implementation of our security strategy. The position requires 5+ years of information security experience and a Bachelor's degree or equivalent. G-P offers competitive compensation and benefits.

Requirements

  • Bachelorโ€™s Degree in Information Technology, Computer Science, Business, or Engineering required, or equivalent experience
  • 5+ years of information security experience, preferably in the technology industry
  • Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages
  • Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies and motives
  • Familiarity with computer network exploitation and network attack methodologies
  • Experience with cloud computing; AWS preferred
  • Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities

Responsibilities

  • Investigate alerts, triage, deep dive, and come up with proper action items and remediation plans
  • Conduct investigation, containment, and other response activities with business stakeholders and groups
  • Compose incident analysis and finding reports for management, including gap identification and recommendations for improvement
  • Recommend or develop new detection logic and tune existing sensors/security controls
  • Participate in security incident response through in-depth, technical (log, forensic, malware, packet) analysis
  • Provide oversight of security alert detection and analysis capabilities across multiple technologies to ensure that security incidents are identified in a timely manner
  • Escalate and support potential security incidents in line with appropriate processes
  • Support communications of potential security incidents via multiple channels
  • Participate in the response of potential security incidents by identifying and communicating relevant supplementary information
  • Identify and analyze new and emerging threats to determine impacts to G-P and provide guidelines and recommendations pertaining to opportunities to strengthen G-P security posture
  • Assist with information security due diligence requests as needed
  • Provide security recommendations to other team members, management, and business stakeholders for solutions, enhancements to existing systems, and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
  • Monitor, secure, and optimize AWS environments using tools like GuardDuty, CloudTrail, and Security Hub, ensuring compliance with security standards
  • Conduct security reviews, perform vulnerability assessments, recommend remediation actions, and manage security policies and access controls to monitor, protect, and govern data and applications across private and cloud environments

Preferred Qualifications

  • Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+
  • Log analysis and security content development in SIEM solutions, e.g. Google SecOps, Splunk, IBM QRadar, LogRhythm, etc
  • Endpoint detection and response tools, e.g. CrowdStrike, SentinelOne, CyberArk EPM, Microsoft Defender, etc
  • Incident Response playbook development, managing security incident analysis and remediation
  • Network-based preventative and detective technologies like Secure Web Gateway, Private Access, IDS/IPS, firewalls, proxy servers, e.g. Netskope, Zscaler, Palo, Versa, etc
  • Log analysis and security content development in SIEM solutions, e.g. Google SecOps/Chronicle preferred, Splunk, IBM QRadar, LogRhythm, etc
  • Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices
  • Strong understanding of security as it relates to DevOps (specifically in CI/CD)
  • Experience in SaaS, multi-tenant customer solutions
  • Experience with AWS security tools and best practices, including IAM, VPC security, and encryption mechanisms
  • Strong understanding of security operations best practices, including email security, data loss prevention, vulnerability management, and the creation and enforcement of policies and rule-based access controls

Benefits

Competitive compensation and benefits

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.