KLA - Ann Arbor, MI

posted 23 days ago

Full-time - Entry Level
Ann Arbor, MI
Computer and Electronic Product Manufacturing

About the position

The Cybersecurity Analyst-SOC at KLA plays a crucial role in defending against cyber threats and ensuring the security of the company's operations. This position involves advanced incident response, threat hunting, and the maintenance of security tools to protect KLA's intellectual property and infrastructure. The analyst will work in a dynamic environment, monitoring security events and responding to incidents on a 24/7 basis, while also contributing to the development of detection strategies and training junior analysts.

Responsibilities

  • Act as an active member of the team monitoring and processing responses for security events on a 24x7 basis, including serving in a rotational on-call capacity.
  • Monitor and analyze IDS, network traffic, and logs to differentiate between potential intrusion attempts and false alarms.
  • Proactively monitor SIEM, EDR, and network-based alerts, responding to active threats to internal networks.
  • Advise incident responders on investigation and resolution steps for computer security incidents.
  • Perform detection, monitoring, analysis, and resolution of security incidents.
  • Plan and implement regular incident response and postmortem exercises, focusing on measurable benchmarks for progress.
  • Review and analyze cyber threats, providing SME support and training to junior security analysts.
  • Transform threat intelligence into effective detection logic and new signatures for SIEM and EDR integration.
  • Evaluate existing detection rules and facilitate the development and tuning of AV, EDR, and SIEM rules for high fidelity alerting.

Requirements

  • Experience in cybersecurity incident response and threat hunting.
  • Proficiency in monitoring and analyzing security events using SIEM and EDR tools.
  • Strong understanding of network traffic analysis and intrusion detection systems (IDS).
  • Ability to advise and guide incident response teams effectively.
  • Experience in developing and tuning detection rules for security tools.

Nice-to-haves

  • Certifications in cybersecurity (e.g., CISSP, CEH, GCIH).
  • Experience with scripting or programming for automation of security tasks.
  • Familiarity with regulatory compliance frameworks (e.g., NIST, ISO).

Benefits

  • Participation in performance incentive programs.
  • Eligibility for additional benefits such as health insurance, retirement plans, and paid time off.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service