Teradata Operations - Boston, MA

posted 2 months ago

Full-time - Entry Level
Boston, MA
Computer and Electronic Product Manufacturing

About the position

We are looking for an analyst to join our security operations team. The analyst will support the effective and efficient operations of the Security Operations Center, including next-gen artificial intelligence (AI) and machine learning (ML) cyber security technologies, threat report generation, incident monitoring/response, and vulnerability management. This role will help to implement and support security best practices, policies, standards, and guidance to ensure the safeguard of company data, infrastructure, and resources from internal and external threats. The ideal candidate has a security engineering background and has an understanding for security operations. In this position, you will drive cybersecurity activities across the enterprise and assist with security policies. You will complete security monitoring operations and manage vulnerability and threat assessments, network access control, incident response, and maintenance. Effectively managing, monitoring, and communicating enterprise security risk will be crucial, as you will maintain visibility across the agency enterprise. You will also assemble and review security assessment and authorization documentation, support briefings and meetings, and communicate recommendations and contract status. Your responsibilities will include managing the scope, schedule, and resource allocation for projects and sustaining activities, supporting the development of policies, strategies, and communications relative to cybersecurity, and analyzing and identifying trends in security log data from various security devices. You will provide Incident Response (IR) support when analysis confirms actionable incidents, conduct threat and vulnerability analysis, and offer security advisory services. Additionally, you will analyze and respond to previously undisclosed software and hardware vulnerabilities, investigate, document, and report on information security issues and emerging trends, and manage cyber situational awareness of the cyber threat landscape while maintaining threat monitoring services. You will apply your knowledge of tactical to strategic level intelligence analysis of cyber threats, vectors, and actors in support of cyber defense and computer network operations. Gathering and reporting on security metrics that demonstrate the relative cost/benefit of the security operations and other cybersecurity initiatives will also be part of your role. You will work to reduce costs and optimize the enterprise cybersecurity posture through efficiencies, reciprocity, security shared services, and automation, while effectively communicating and collaborating with internal and external key stakeholders. Meeting security audit mandates, standards, and requirements will be essential, along with performing other duties and projects as assigned.

Responsibilities

  • Drive cybersecurity activities across the enterprise and assist with security policies.
  • Complete security monitoring operations and manage vulnerability and threat assessments, network access control, incident response, and maintenance.
  • Effectively manage, monitor, and communicate enterprise security risk by maintaining visibility across the agency enterprise.
  • Assemble and review security assessment and authorization documentation.
  • Support briefings, meetings, and communicate recommendations and contract status.
  • Manage the scope, schedule, and resource allocation for projects and sustaining activities.
  • Support development of policies, strategies, and communications relative to cybersecurity.
  • Analyze and identify trends in security log data from many heterogeneous security devices.
  • Provide Incident Response (IR) support when analysis confirms actionable incidents.
  • Provide threat and vulnerability analysis and offer security advisory services.
  • Analyze and respond to previously undisclosed software and hardware vulnerabilities.
  • Investigate, document, and report on information security issues and emerging trends.
  • Manage cyber situational awareness of the cyber threat landscape and maintain threat monitoring services.
  • Apply knowledge of tactical to strategic level intelligence analysis of cyber threats, vectors, and actors in support of cyber defense and computer network operations.
  • Gather and report on security metrics that demonstrate the relative cost/benefit of the security operations and other cybersecurity initiatives.
  • Reduce cost and optimize enterprise cybersecurity posture through efficiencies, reciprocity, security shared services, and automation.
  • Effectively communicate and collaborate with internal and external key stakeholders.
  • Meet security audit mandates, standards, and requirements.
  • Perform other duties and projects as assigned.

Requirements

  • Bachelor's Degree in Cyber Security, Information Technology, or related field preferred.
  • Minimum of one (1) year of progressive information security experience is preferred.
  • Experience working in a Security Operation Center preferred, but not required.
  • Understanding of security methodologies.
  • Understanding of ticket-driven workflows.
  • Intermediate scripting knowledge in PowerShell or similar languages.
  • Experience in resolving issues and scheduling conflicts and solving complex problems.
  • Excellent listening skills and communication skills including oral, written, and formal presentations.
  • Ability to design and implement technical solutions for business problems while balancing functionality, sustainability, time to delivery, and costs.
  • Ability to develop and maintain current and future state technology architectures.
  • Advanced knowledge of and experience with computer vulnerabilities, hacker methodologies, and other threats.
  • Intermediate skills in computer terminal and personal computer operation; Microsoft Office applications including but not limited to: Word, Excel, PowerPoint, and Outlook.
  • Ability to deal with complex challenges involving multiple facets and variables in non-standardized situations.
  • Ability to perform Digital Forensics and Incident Response (DFIR).

Benefits

  • Flexible work model
  • Focus on well-being
  • Diversity, Equity, and Inclusion commitment
  • Competitive Total Rewards package
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service