Security Operations Analyst
- Posted 15 March 2023
- Job type Permanent
Paid Parental Leave
Return to Work Policy
Flexible Working Arrangements
Leadership Development Program
Raise Numbers Of Women In Leadership
Internal Women's Networking Group
Equal Pay Initiatives
Security Operations Analyst
Equinix is the world’s digital infrastructure company, operating 245+ data centers across the globe and providing interconnections to all the key clouds and networks. Businesses need one place to simplify and bring together fragmented, complex infrastructure that spans private and public cloud environments. Our global platform allows customers to place infrastructure wherever they need it and connect it to everything they need to succeed.
At Equinix, we help the world’s digital leaders scale with agility, speed the launch of digital services, deliver world-class experiences, and transform people’s lives. Our culture is based on collaboration and the growth and development of our teams.
We hire hardworking people who thrive on solving challenging problems and give them opportunities to hone new skills, and try new approaches, as we grow our product portfolio with new software and network architecture solutions. We embrace diversity in thought and contribution and are committed to providing an equitable work environment. that is foundational to our core values as a company and is vital to our success.
The Information Security team at Equinix is looking for an Incident Response Analyst to become a member of the team. With offices located globally, the successful candidate will assist in monitoring, investigating and responding to security incidents worldwide.
This role will help grow your knowledge of latest security threats, technologies and best practices to help keep Equinix secure. In addition to a focus on Information Security, this role will work closely with Users, Network, System infrastructure, and Application teams to provide guidance and best practice solutions, to work on problems of a diverse scope where analysis of a situation requires evaluation and judgment. The ideal candidate will have a passion for information security, be self-motivated and think innovatively to improve security solutions either by developing new IR processes, tuning security tools, and automating IR tasks for a more efficient security incident response.
Knowledgeable with information security concepts, threats, and technologies
Passionate in Cybersecurity and Incident Response
Flexible, detail-oriented and an innovative thinker
Driven to learn new things; excited about challenges and finding solutions
Monitor, investigate, respond to security incidents following the NIST SP800-61 framework
Create security incident reports to document detections, findings and remediations performed
Perform in-depth investigation to identify file, URL, or email rating from reputation services
Perform static and/or malware dynamic analysis on suspicious files/URLs
Hunt for known and unknown threats
Perform proof-of-concept on latest security technologies
Tune security tools to improve detection and response
Automate Incident Response tasks for efficiency
Work with IT team members to identify requirement, and develop processes, procedures, communications strategies and standards for Information Security operations.
Utilize logs and analysis tools to assist in Cyber threat detection and incident response activities as required.
Provides advice and guidance to users and cross IT functions on the best Information Security practices.
Assist with monthly internal anti-phishing awareness and training program.
Partner with InfoSec teams (threat intel, security engineering, pen testing) to improve the company’s security policies, processes, and technologies.
Demonstrate problem solving skills that contribute towards the resolution of any issues that arise. Document solutions, processes, or procedures and present them in writing, verbally on the phone or in person.
Recommends implementation of countermeasures or mitigating controls
Work in a 24/7 environment
College degree in computer science, data communications, electrical or computer engineering or an equivalent combination of course work and experience.
At least 3 years working experience in the SOC or Cybersecurity-related
Current Security+, CySA+, ECIH or CHFI certification
Ability to understand key security concepts on network segmentation, access management, vulnerability & patch management, SIEM, encryption, data security loss prevention, intrusion detection and prevention systems, anti-malware/virus, defensive threat hunting, email security
Strong understanding of Network Infrastructure and Protocols
Knowledge of and ability to administer scripting languages: PowerShell, Python, Perl, PHP, Bash, Ruby
Understanding of diverse Operating systems such as Windows, Unix-based OS’ (to include AIX, Linux flavors, and MacOS)
Proficient in using various sandboxing, triage, malware reverse-engineering tools
Proven ability to make important decisions independently and multi-task under pressure, responding quickly to changing situations in complex environments without compromising quality