background_image
  • IMAGE: Return to Main
  • IMAGE: Show All Jobs


Position Details: Expert Cyber Threat Analytics Engineer-(927251F)

Location: Hillsboro, OR
Openings: 1
Job Number:

Share

Description:

Expert Cyber Threat Analytics Engineer

We are always on the offense at Client, and we are looking for a talented and energetic self-starter with a passion for analytics and security to join our growing Cyber Threat Analytics team. As an Expert Cyber Threat Analytics Engineer, you will shape the future of security analytics and cyber threat detection at Client within Corporate Information Security. Client’s Technology organization blends engineering and process expertise into streamlined consumer- and customer-oriented solutions for our $30B+ business, enabling Client, Inc.'s businesses and brands worldwide.

As an Expert Cyber Threat Analytics Engineer, you will lead data-driven security at Client and perform analytics on a petabyte platform. You will perform root cause analysis and implement leading-edge approaches to identify malicious and suspicious behavior. You will identify real-time and persistent threats to Client using data modeling techniques. You will also help manage a portfolio of technology partners and solutions to keep Client’s security posture responsive. This role is perfect for a team player with strong security analytics experience, curiosity, and communication skills. You must be a proven problem solver, adept at making good decisions under pressure, comfortable with cross-functional and distributed teams, and flexible with changing priorities.

The Expert Cyber Threat Analytics Engineer will elevate security analytics at Client by distilling complex analytical concepts to business and technical audiences alike using clear, eye-catching visualizations. You will enable a culture of data-driven decision making by rising above the numbers and explaining insights to business users. You know how to minimize complexity and focus on results. While you rely on data to prove your point, you love to think outside the box and solve problems creatively. You thrive in an entrepreneurial environment.

 

Qualifications:

 

  1. Knowledge of information security standards, principles, and practices
  2. Computer programming and/or scripting languages (Python, Powershell, Java Script, Go, etc.)
  3. Experience with massive log aggregation and analysis
  4. The ability to learn and apply new concepts quickly
  5. Strong written and oral communication skills
  6. Comfortable with interfacing with other internal or external organizations regarding security policy and standards violations, security controls failure and incident response situations
  7. Ability to assess and communicate risk within a business context
  8. Passion for Client, for security, and a drive for continuous learning
  9. Ability to balance and prioritize work
  10. Proficiency with Windows, Mac OSX and Linux
  11. Understanding of network, desktop and server technologies
  12. Proven track record of success in fast-moving organizations with complex technology applications

Additional skills and qualifications preferred, but not required.

  1. Certified Big Data Administrator/Architect
  2. Database administration
  3. Experience leveraging automated server configuration tools (such as Puppet or Chef)
  4. Certified Information Security Professional (CISSP)
  5. Experience with network intrusion methods, network containment, segregation techniques and technologies such as Intrusion Detection Systems (IDS) and Intrusion Protection Systems (IPS)
  6. SIEM experience preferred
  7. Forensics or cyber intelligence experience a plus

 Education and Experience

  1. Requires a Bachelor’s degree in computer science or related field, or equivalent work experience
  2. Five years of information technology experience with preferred three years in an information security-related role

Required

  1. COMPUTER PROGRAMMING
  2. ENGINEER
  3. INCIDENT RESPONSE
  4. INFORMATION SECURITY
  5. JAVA
  6. Additional

  7. LINUX
  8. MAC
  9. PROBLEM SOLVER
  10. PYTHON
  11. SCRIPTING
  12. SECURITY
  13. CHEF
  14. CISSP
  15. DATA MODELING
  16. DATABASE
  17. DATABASE ADMINISTRATION
  18. DATABASES
  19. FORENSICS
  20. IDS
  21. INTRUSION
  22. INTRUSION DETECTION
  23. INTRUSION DETECTION SYSTEMS
  24. IPS
  25. PUPPET
  26. REAL-TIME
  27. ROOT CAUSE ANALYSIS
  28. SELF MOTIVATED
  29. SELF-STARTER
  30. SIEM
  31. TEAM PLAYE

Perform an action:

IMAGE: Apply to Position
mautic is open source marketing automation




Powered by: CATS - Applicant Tracking System