πUnited Kingdom
No job title found.

Hitachi
πRemote - Mexico
Please let Hitachi know you found this job on JobsCollider. Thanks! π
Summary
Join Hitachi Vantara's Cybersecurity Incident Response team as an Incident Responder, playing a crucial role in protecting the company's information systems and data. Respond to security incidents, provide guidance to junior team members, and act as an escalation point for high-severity issues. Collaborate with colleagues across different regions and IT departments. The ideal candidate possesses strong networking knowledge, experience in incident response and log analysis, and excellent communication skills. This position requires a minimum of 3 years of IT or cybersecurity experience and fluency in English. Hitachi Vantara offers a supportive and inclusive work environment with industry-leading benefits and flexible arrangements.
Requirements
- Be fluent in English
- Possess strong working knowledge of networking concepts, the OSI model, firewalls, ACLs, load balancers, packet capture utilities such as Wireshark
- Possess strong working knowledge and experience responding to host-based threats and risks, including ransomware
- Possess strong working knowledge and experience with log analysis using a SIEM including writing and tuning rules for alerts, reading and interpreting logs from various platforms including Linux, Windows, and networking appliances
- Possess working knowledge of EDR and Anti-Malware technology and platforms
- Have 3 years total experience in IT or cyber security
Responsibilities
- Respond to security incidents, either from alerts out of the security toolset, or escalated alerts from our MSSP
- Provide guidance and coaching to junior members of the team
- Act as an escalation point for high severity incidents
- Collaborate with other Incident Response team members in other regions (Americas and Europe)
- Interact and collaborate with practitioners across IT, including Help Desk, Desktop Operations, System Administration, Networking, and cloud environment administrators
- During high priority incidents direct the investigation and response activities of other security analysts, IT practitioners, and provide reporting and updates to Director level management
Preferred Qualifications
- Have experience with SentinelOne and Microsoft Defender
- Have 2 yearsβ experience working as a SOC analyst or incident response role
- Have a security certification such as CISSP, CISM, GSEC, CEH, CISA or other
- Have knowledge of AWS and Microsoft Azure environments and concepts
- Have experience leading small teams
Benefits
- Industry-leading benefits that go far beyond compensation
- Support, services, and resources that also take care of your holistic health and wellbeing
- Flexible arrangements that work for you (role and location dependent)
Share this job:
Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.
Similar Remote Jobs
πWorldwide
πUnited Kingdom

πWorldwide
πWorldwide

πUnited States
πUnited States
πWorldwide
πWorldwide