Senior Incident Response Analyst

Posted 3 Days Ago
Be an Early Applicant
2 Locations
Mid level
Utilities
The Role
The Senior Incident Response Analyst will manage threat detection and incident response for the Security Operations Center (SOC), collaborating with global teams to develop plans and procedures while conducting proactive threat analysis. Responsibilities include managing security events, coordinating incident communications, and enhancing security controls through various tools and methodologies.
Summary Generated by Built In

Title: Senior Incident Response Analyst (SOC)
Location: Monterrey, N.L.

Blue Yonder is seeking a “Hands-on” Senior Incident Response Analyst (SOC) who would be responsible for threat detection, monitoring and Incident response. Looking for suitable candidates to join SOC (Security Operations Team) Tier-2 & 3, 24x7 team as Sr. Incident Response Security Analyst. The candidate will be responsible for Daily SOC Operations and security incident response. The candidate is required to work 5 days a week, which could be weekends as well. This candidate will closely be partnering with internal security teams across the world.

Responsibilities

  • Detect and respond to cyber security threats to ensure your organization operates securely.

  • Partner with the existing internal SOC team across the world and keep the CISO informed about security operations.

  • Act as a liaison between the SOC team, other internal stakeholders, and external parties such as vendors, clients or regulatory bodies.

  • Develop incident management plans and procedures, surveying the networks for signs of a breach.

  • Coordinating and executing tabletop exercises to practice, develop plans, policies and procedures.

  • Perform proactive threat hunts to identify threats and assess the state of security controls.

  • Work with in-house red teams in order to detect offensive operations, and capture and action findings.

  • Proactively look for suspicious anomalous activity based on data alerts or data outputs from various toolsets.

  • Drive Security Incidents end-end as Incident Responders (Asses, Triage, Communication, Remediation, Documentation)

  • Develop new SIEM use-cases to detect un-usual activities.

  • Develop Incident Response Playbooks for emerging Threats/attack types.

  • Work on malware analysis, Phishing email analysis, and all other alerts reported.

  • Document the lessons learned and improve the process.

  • Responsible for completing the documentation of the investigation; determine the validity and priority of the activity and escalate to senior SOC analysts or leads.

  • Carry out Level 3 triage of incoming issues (initial assessing the priority of the event, initial determination of incident to determine risk and damage or appropriate routing of security or privacy data request)

  • Provide communication and escalation throughout the incident per the SOC guidelines.

  • Identify and manage a wide range of threat intelligence sources to provide a holistic view of the threat landscape and filter out noise to focus and execute upon actionable intelligence.

  • Leading the development of actionable use cases to detect, triage, investigate and remediate based on latest threat actor trends, support teams with the technical implementation of parsing log sources creating, validating and testing alerting queries to reduce false positives.

  • Ensure that all security events and incidents (internal / external) are logged into ServiceNow and regularly updated and closed within the set SLAs

Qualifications

  • At lest 3-6 years of proven experience in Security incident response and SOC Operations

  • Practical experience with threat detection, monitoring and incident response and implementation

  • Ability to query and write detection rules, in Security tools, (i.e., SIEM (Qradar / Splunk), SOAR, WAF, AV, Firewalls, Internet-facing services).

  • Strong technical understanding of network/OS fundamentals and common Internet protocols, specifically DNS, HTTP, HTTPS

  • Experience conducting technical analysis of security events including Malware analysis, Phishing, and digital forensics.

  • Strong written and oral communication skills.

  • Experience in investigating security issues and / or complex operational issues on Windows and Linux

  • Knowledge of email security threats and security controls, including analyzing email headers, Web attack, network traffic analysis using tools such as Wireshark.

  • Experience reviewing system and application logs (e.g., web or mail server logs)

  • Familiarity with core concepts of security incident response, e.g., the typical phases of response, vulnerabilities vs threats vs actors, Indicators of Compromise (IoCs), etc.

  • Certifications such as GCIH, GCIA, GSEC, CEH, Security+, SSCP.

  • Results focused and attention to detail.

  • Available to work outside of their shift when needed.

At Blue Yonder, we care about the wellbeing of our employees and those most important to them. This is reflected in our robust benefits package and options that includes

  • Competitive Salary

  • Christmas Bonus (30 days)

  • Savings Fund

  • 15 Vacation Days on first two year and 60% Vacation bonus

  • Major and Minor Medical Service insurance for you and your family

  • Life Insurance

  • Totalpass

  • Annual bonus

  • And more to be shared!

#LI-JA1

Our Values

If you want to know the heart of a company, take a look at their values. Ours unite us. They are what drive our success – and the success of our customers. Does your heart beat like ours? Find out here: Core Values

Diversity, Inclusion, Value & Equity (DIVE) is our strategy for fostering an inclusive environment we can be proud of. Check out Blue Yonder's inaugural Diversity Report which outlines our commitment to change, and our video celebrating the differences in all of us in the words of some of our associates from around the world.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

Top Skills

SIEM
Soar
Waf
The Company
Peterborough
240 Employees
On-site Workplace
Year Founded: 2005

What We Do

The Anglian Water's @one Alliance is a partnership consisting of 8 companies, who each provide specialised knowledge allowing the @one Alliance to deliver complex delivery projects in the most efficient way, reducing the cost to Anglian Water’s customers.

Within @one Alliance we’ve currently embarked on a huge programme of work costing a massive £1.2 billion. We’ve entered year 5 of our current 5-year Asset Management Period (AMP7) meaning we’re full steam ahead in delivering around 50% of Anglian Water’s capital delivery projects.

Our partners are Anglian Water Asset Delivery, Balfour Beatty, Barhale, Binnies, Mott MacDonald Bentley (MMB), SWECO, SKANSKA and MWH Treatment. Employees in the @one Alliance are employed across all our partner companies and work together to deliver complex programmes of work.

The @one Alliance is currently working on over 700 projects all designed to improve and expand the Anglian Water network to better serve existing customers and help ensure supply for future customers as well.

As we move into AMP (Asset Management Period 8) in 2025, our work is set to increase from a £1.2 to an approximate £2.6 billion programme of works….so there has never been a better time to join us on our journey!

Take a look at our jobs page to see the options available to you

Similar Jobs

Takeda Logo Takeda

SAP Logistics Consultant (SAP MM-IM, SAP LE, SAP LE-TRA)

Healthtech • Software • Analytics • Biotech • Pharmaceutical • Manufacturing
Remote
4 Locations
50000 Employees

Mondelēz International Logo Mondelēz International

Developer, Process Development & Engineering

Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
Hybrid
2 Locations
90000 Employees

John Deere Logo John Deere

Design Engineer - Monterrey

Artificial Intelligence • Cloud • Internet of Things • Machine Learning • Analytics • Industrial
Hybrid
Garza García, San Pedro Garza García, Nuevo León, MEX
69000 Employees

Magna International Logo Magna International

Manager, Corporate HR - Mexico

Automotive • Hardware • Robotics • Software • Transportation • Manufacturing
Hybrid
San Pedro Garza Garcia, San Pedro Garza García, Nuevo León, MEX
171000 Employees

Similar Companies Hiring

Sierra Space Thumbnail
Utilities • Robotics • Information Technology • Hardware • Aerospace
Broomfield, CO
1600 Employees
LineVision Thumbnail
Utilities • Renewable Energy • Internet of Things • Greentech • Energy • Analytics
Boston, MA
85 Employees
Energy CX Thumbnail
Utilities • Professional Services • Greentech • Financial Services • Energy • Consulting • Business Intelligence
Chicago, IL
55 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account