JobTitle: CYBERSECURITY STAFF ANALYST - Aaron
Job ID: 414486_en-us
Salary Range: null- null
Job Category: Technology
Employment type: Full Time
Position Description:
Position Purpose:
Protecting what matters most to our associates and consumers by securing our sensitive data and critical assets from current and emerging threats. At The Home Depot Cybersecurity consists of Architecture, Governance, Identity & Access Management, Internal Threat Operations, Issue and Compliance Management, Risk Assessment/Advisory, Security Consulting, Security Operations and Strategic Planning.
Job Description:
The Cybersecurity Staff Analyst is a senior-level position within the SOC TDR (Threat Detection & Response) team. This analyst will report to the TDR Manager and will perform tasks including advanced security monitoring through research, classification, and analysis of security events. The TDR Staff Analyst will leverage security solutions to investigate alerts and anomalous behavior. The TDR Staff Analysts will serve as an escalation point for the TDR teams, lead the review and processing of alerts from various sources, and provide expert-level analysis and detection capabilities.
Staff Analysts perform data gathering, analysis, synthesis and develop solutions to support THD Cybersecurity practices. Staff Analyst mentors and guides Jr Analysts. Lead multiple projects, possess excellent communication skills, work well with a team, interact with multiple levels and functions across the organization.
Major Tasks, Responsibilities & Key Accountabilities:
100% Deliver Execution, Plans & Aligns, Develop Others - Oversee multiple projects simultaneously; Strategic partner to align solutions to customers expectations Communicate to various levels of business partners; Collaborate with stakeholders, business partners, colleagues, developers and others to deliver high quality solutions; Partner cross-functionally to define assess, communicate, implement, train and change management of projects; Lead, mentor and provide guidance to team members and partners; Serve as SME and perform research/analysis within assigned projects
Responsibilities
Be the front-line responder by identifying, triaging, and remediating security detections and anomalies
Provide incident response support, leadingThreat Detection and Response analysts during technical investigations, effectively communicating results, analyticalanalysis, and mitigations to different operational teams and management
Lead projects to ensure projects align with and meet the strategic roadmap for Threat Detection and Response
Analyze and interpret complex and high-volume data from various sources to advance investigations, quantify trends, or support analytical findings
Leverage technology (commercial and open source) to enrich, triage, and characterize internal insights on malware and Indicators of Compromise (IOCs)
Lead the development of new investigative techniquesand automationworkflows. Regularly reviewing playbooks for efficiency and proactively improving playbooks where necessary
Stay informed about information security trends and technologies in the technology industry and identify best practices and/or methodologies
Work with and train junior analysts on THD technologies, alert lifecycle, and investigative best practices
Experience (Essential)
BS/MS degree in Computer Science, Cybersecurity, or 5+ years relevant cybersecurity experience
Ability to lead other analysts in day-to-day SOC operations
Effectively create and deliver meaningful briefs (metrics) to various teams and management
Strong understanding in at least one of the following disciplines: network analysis; intrusion analysis; malware analysis; understanding of red team tactics
Experience with SIEM, EDR solutions, and analyzing network and endpoint logs
Knowledge of cloud infrastructure and cloud security.
Knowledge in evaluating network traffic including interpreting logs and packet captures
Experience (Preferred)
Experience scripting solutions using vendor and open-source tools’ APIs
Knowledge of MITRE ATT&CK Framework
Proficiency with Python or other scripting languages
Partner with threat intel teams for the discovery, detection, and mitigation of threats
Threat hunting - Leverages offensive cyber tactics to identify threats within the network and perform guided searches throughout the environment utilizing known cyber tactics.
Threat hunting - Have a strong cybersecurity background and know how to proactively hunt and investigate threats, be able to use code to automate investigative actions, and be proficient in scripting languages, such as Python.
Soft Skills
Experience communicating threats and findings in a cross-team setting
Demonstrated problem solving skills with an ability to develop creative alternatives to complex problems, as well as continuous process improvement skills
Demonstrated ability to handle sensitive information
Ability to establish credibility and working relationships with a wide range of personnel, including operations and management
Solid understanding of project management principles, including a demonstrated ability to multi-task effectively
Nature and Scope:
This position typically reports to Manager or Sr. Manager
This position has 0 Direct Reports
Environment:
1. Located in a comfortable indoor area. Any unpleasant conditions would be infrequent and not objectionable.
Travel:
No travel required.