מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר
Job Duties:Design and implement security mechanisms and ongoing support of the cyber security detection program and processes within the global information security team. Identify security detection gaps in infrastructure and process, effectively execute projects/initiatives to address them, demonstrate excellent judgment, prioritization and communication of technical security risks, and act as a security liaison supporting business units. Build security specific applications necessary to implement threat detection use cases and transform into correlation queries, templates, reports, rules, alerts, dashboards, and workflow. Design, develop and deploy dashboards to enable threat hunting, increase visibility to logs and reduce search time, using XML and search processing language (SPL) as and when required. Responsible for system monitoring and analysis, security incident response, security forensics and developing and automating creative solutions. Gather, maintain, and analyze cyber-security data and other key performance indicators for regular executive review and any compliance/regulatory related requirements. Articulate security issues, analysis, and remediation techniques to peers, leadership, and across business lines, both technical and non-technical audiences. Create reports, pivots, advanced searches, and visualizations using SQL and Splunk query languages. Support application teams in onboarding custom and native logs to Splunk and creating customized dashboards and correlation searches troubleshooting of Splunk searches for performance issues by adding lookups, correct joins and using summary indexes. Participate in after action reviews and contribute to improvements in the overall security posture of eBay.
Bachelor’s degree, or foreign equivalent, in Computer Science, Engineering, or a closely related field plus three years of experience in the job offered or a related occupation.
Special Skill Requirements:
1. Scripting
2. Linux audited framework
3. Database activity monitoring
4. Threat modeling
5. Incident response
6. Security detection
7. Purple teaming
8. Threat intelligence detection
Must be legally authorized to work in the U.S. without sponsorship.
This website uses cookies to enhance your experience. By continuing to browse the site, you agree to our use of cookies. Visit our for more information.
משרות נוספות שיכולות לעניין אותך