

Share
As a Cyber Incident Response Analyst L2, this role is responsible for investigating and reporting of security incidents supporting all Dell Business Units. This role requires experience in all phases of Cybersecurity incident response including preparation, analysis, notification, response, recovery, and post-mortem activities. This role interacts with all levels of the organization and is viewed as a subject matter expert on all Incident Response activities.
You will:
Serve as a global escalation point and work with the Incident Response Team members on tickets to manage / prioritize queue assignments
Perform technical cyber security investigations on security incidents, root cause analysis, recommend and mitigate the effects caused by an incident
Participate in After Actions Reports creation based on Lessons Learned from critical cybersecurity incidents
Investigate/analyze large and unstructured data sets, malicious artifacts, and EDR tools to identify trends and anomalies indicative of potential threats
Liaison with stakeholders and internal CSIRT teams to serve as a Cyber Security Champion to help implement best security practices and mature the Security Incident Response process to meet the needs of the business.
3-5 years hands-on experience with focus in areas such as systems, network, application, and information security
Exceptional ability to conduct cybersecurity investigations, analyze and distill relevant findings and determine root cause
Strong knowledge of security and web technologies such as SIEM, full packet capture, Firewall/NGFW, IDS/IPS, EDR, DLP, UEBA, networking protocols, Microsoft Windows and Linux/Unix platforms and tools with related experience in corporate infrastructures
Strong technical experience and familiarity of various types and techniques of cyber-attacks, with the incident response and threat hunting lifecycles
Excellent analytical thinking, time management and coordination skills and excellent command in English (both written and verbal)
Desirable Requirements
Industry recognized certification (CISSP, SANS GCIH, GCIA, GNFA, GREM, etc.)
Knowledge and experience in: Digital Forensics, reverse malware tools, and scripting languages
These jobs might be a good fit

Share
You will:
Respond to global safety and security incidents by receiving, analyzing, and dispatching/assigning response teams to mitigate potential threats.
Provide continuous monitoring of Dell Technologies facilities 24/7, team members, and other assets and respond accordingly to incidents
Actively monitor global security threats with the potential to impact DT travel hubs and individual travellers.
Receive, evaluate, and disseminate incoming information and reports from security personnel, employees, contingent workers, suppliers, reporting parties, and local agencies
Experience responding to global safety and security incidents by receiving, analyzing, and dispatching/assigning response teams to mitigate potential threats.
Capable of providing continuous monitoring of Dell Technologies facilities 24/7, team members, and other assets and respond accordingly to incidents
Experience actively monitor global security threats impacting DT travel hubs and individual travelers.
Basic understanding of receiving, and disseminating incoming information and reports from security personnel, employees, contingent workers, suppliers, reporting parties, and local agencies.
Desirable Requirements
College degree preferred but not required
Here’s our story; now tell us yours
DD Month YYYY
These jobs might be a good fit

Share
SRO Operations and Fusion Center
orporate SecuritySecurity and Resiliencywho will havea fantasticmake a profounnew modernizationleveraging their knowledge and sfoster result driven programs.
This role supports security operations and management within the SRO Operations and Fusion Center (OFC).
you will be responsiblesupporting the broader twith priority settingensure coordinationexecution ofgoals, strategic plan, associated policiesand program leadership.
You will:
Provide comprehensive operational and logistics support for OFC initiatives, ensuring smooth execution and alignment with organizational goals.
Coordinate and create program documentation, such as roles and responsibilities, team processes, procedures, operations manuals, and training materials.
Drive event coordination efforts, including facilitating OFC tours, executive briefings, and on-site meetings.
Requirements:
years of related experience in a professional role with a Bachelor’s degree; or an advanced degree withoutexperience; or equivalent experience
organizational skillswith a high degree ofattention to detail andaccuracy.
withexcellentinterpersonal skills to interact effectively withinternal and external customers, at various social levels and across diverse cultures.
A high level of proficiency atdata managementandwork deliveredthroughMS Office Suitei.e.Microsoft Office 365,PowerPoint, Excel,and similar.
Must be able to demonstrate an ability to recognize and protectpersonalinformation entrusted to the SRO security groupdata management.
trong written and verbal communication skills.Confident at group presentation
Desirable Requirements
College degree preferred but not required
These jobs might be a good fit

Share
You will:
Respond to global safety and security incidents by receiving, analyzing, anddispatching/assigningresponse teams to mitigate potential threats.
Provide continuous monitoring of Dell Technologies facilities 24/7, team members, and other assets and respond accordingly to incidents
Actively monitor global security threats with the potential to impact DT travel hubs and individual travellers.
Receive, evaluate, and disseminate incoming information and reports from security personnel, employees, contingent workers, suppliers, reporting parties, and local agencies
Respond to global safety and security incidents by receiving, analyzing, anddispatching/assigningresponse teams to mitigate potential threats.
Provide continuous monitoring of Dell Technologies facilities 24/7, team members, and other assets and respond accordingly to incidents
Actively monitor global security threats impacting DT travel hubs and individual travelers.
Receive, and disseminate incoming information and reports from security personnel, employees, contingent workers, suppliers, reporting parties, and local agencies.
This position is onsite at a Dell Technologies facility and not remote or hybrid.
Desirable Requirements
College degree preferred but not required
These jobs might be a good fit

Share
Analyst in Corporate Security Servicesassigned to the Corporate Security Services integrated with our converged Operations and Fusion Centerto do the best work of your career and make a profound social impact.
What you’ll achieve
As aIntelligence Analyst, you’ll help keep Dell safe from threats by delivering timely, relevant, and insightful intelligence analysis that is actionable for stakeholders. You’ll conduct forward leaning research and analysis on threats to Dell and the technology sectoranticipate “what’s next” on ththreat landscape.
You will:
This includes:
ontribute to the strategic intelligence team and liaise with other analytical functions intheSecurity Resiliency Organization (SRO) and enterprise-wide. Functions include research and production of timely, accurate, and actionable threat intelligence analysis to support Dell Technologies’ decision makers and security operations personnel.
Research, analyze, and report on defense, technology, threat actors and groups, and related political and economic conditions.
in-depth research, collaboratewith industryspecialistsand peer analysts, developand maintainshort- and long-term research projects, producefinished intelligence for tactical and executive audiences, and present findings through briefings and external engagements.
Discover, identify, and report regularly on significant threats and risks that emerging technologies present to businesses, governments, and other organizations.
Maintain, develop, and continuously evaluate threat intelligence sources to increase effectiveness and timeliness of creating actionable threat assessments.
Essential Requirements
Must have 2-4 years of experience inThreat Intelligence or Government Intelligence Analyst roles. Bachelor's degree or equivalent work experience, preferably in Political Science, International Relations, Economics, Information Security, Engineering or Computer Science.
Strong interpersonal skills and the ability to work well in a team environment.
Familiarity with open-source intelligence (OSINT), social media intelligence (SOCMINT), human intelligence (HUMINT), and technical intelligence (TECHINT) gathering skills.
Good understanding of the intelligence lifecycle and associated analytics.Familiarity with industry-specific defense practices.
Desirable Requirements
Basic knowledge of threat intelligence and defense concepts.
Basic familiarity withcorporateespionage groups and threat campaigns, including but not limited to their associated TTPs and malicious tools.
Knowledge of technology sector, and the intelligence cycle, particularly within a private sector environment is an asset.
These jobs might be a good fit

Share
You will:
Drive hardware design based on customer requirements and required infrastructure. Address liquid cooling solutions and other mechanical engineering aspects that scale based on datacenter requirements. Define hardware topologies that are optimized for efficiency and performance.
Lead the development of end-to-end datacenter hardware architecture including CDU, cold-plates, manifold, rack, and skid at the datacenter level.
Optimize the hardware configuration to maximize performance and efficiency of datacenter components.
Work closely with key external partners to create differentiated solutions.
Develop hardware solutions and architecture to integrate with datacenter frameworks and applications.
Essential Requirements
15+ years applicable industry experience or equivalent skill; must include expert understanding of key mechanical engineering technologies related to datacenter components such as CDU, cold-plates, manifold, rack, and skid.
Proficiency using tools like Creo
Experience with datacenter hardware design and liquid cooling solutions.
Knowledge of mechanical engineering industry standards.
Customer and partner project/program leadership experience; must have the ability to understand and assess customer requirements, develop technical solutions based on customers' geographical area, negotiate conflicting interests, and prioritize deliverables to achieve the best possible outcome for all stakeholders; need to be able to travel 20%-30%.
Desirable Requirements
Masters, PhD or Bachelor’s degree or equivalent experience
Possess relationships with key suppliers ofdatacenter products & components.
$216,750 - $323,400
These jobs might be a good fit

Share
As a Cyber Incident Response Analyst L2, this role is responsible for investigating and reporting of security incidents supporting all Dell Business Units. This role requires experience in all phases of Cybersecurity incident response including preparation, analysis, notification, response, recovery, and post-mortem activities. This role interacts with all levels of the organization and is viewed as a subject matter expert on all Incident Response activities.
You will:
Serve as a global escalation point and work with the Incident Response Team members on tickets to manage / prioritize queue assignments
Perform technical cyber security investigations on security incidents, root cause analysis, recommend and mitigate the effects caused by an incident
Participate in After Actions Reports creation based on Lessons Learned from critical cybersecurity incidents
Investigate/analyze large and unstructured data sets, malicious artifacts, and EDR tools to identify trends and anomalies indicative of potential threats
Liaison with stakeholders and internal CSIRT teams to serve as a Cyber Security Champion to help implement best security practices and mature the Security Incident Response process to meet the needs of the business.
3-5 years hands-on experience with focus in areas such as systems, network, application, and information security
Exceptional ability to conduct cybersecurity investigations, analyze and distill relevant findings and determine root cause
Strong knowledge of security and web technologies such as SIEM, full packet capture, Firewall/NGFW, IDS/IPS, EDR, DLP, UEBA, networking protocols, Microsoft Windows and Linux/Unix platforms and tools with related experience in corporate infrastructures
Strong technical experience and familiarity of various types and techniques of cyber-attacks, with the incident response and threat hunting lifecycles
Excellent analytical thinking, time management and coordination skills and excellent command in English (both written and verbal)
Desirable Requirements
Industry recognized certification (CISSP, SANS GCIH, GCIA, GNFA, GREM, etc.)
Knowledge and experience in: Digital Forensics, reverse malware tools, and scripting languages
These jobs might be a good fit