מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר
What you can expect in Identity & Access Management:
The Identity Defense Senior Specialist will regularly collaborate with experts in and out of our team, both in country and in other regions, so excellent communication skills are very important. The role will also involve discussion with employees and senior leadership. You will utilize in-depth technical knowledge and business requirements to help implement scalable solutions, inclusive of monitoring, alerting, and escalation frameworks focused on core account protections. Leveraging your knowledge of both common and emerging threats related to account take-over, you will have an opportunity to proactively develop, implement, and influence controls and policy within the digital identity domain. You will partner with leaders from line of business organizations to respond to security events related to identity, improve awareness of security risks that pose a risk to the organization, provide updates to the current state of the identity defense program and work to improve detection and prevention efforts in the environment.
Responsibilities will include but not limited to:
Actively investigate alerts related to potentially anomalous behavior/activity.
Confidently and professionally interview/question users to determine or confirm root cause.
Communicate effectively with response and business partners.
Build and monitor Splunk alerting and dashboards.
Identify areas for further process automation, simplification, and improvement.
Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.
Risk management.
Comprehensively document analysis, investigative activities, actions, etc.
Ability to work non-standard hours, to include occasional on-call time during nights, weekends, and holidays.
Required Skills:
Minimum of 5 years’ experience within the operational side of the Information Security industry.
Ability to analyze data and evaluate relevance to a specific incident under investigation.
Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.
Ability to exercise independent judgment when responding to alerts.
Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.
Familiarity with security vulnerabilities exploits and hacker techniques.
Familiarity with identity management standards, social engineering TTPs, and the incident response lifecycle.
Familiarity with Splunk, with the ability to build queries, alerts, dashboards, etc.
Knowledgeable of current authentication based exploits in traditional and cloud environments, for both human and non-human accounts.
Proven experience presenting findings via written reports and orally to key stakeholders in clear and concise language.
Can remain calm under pressure.
Ability to work in a strong team-orientated environment with a sense of urgency and resilience.
Critical thinking - must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks while remaining risk and objective focused.
Experience detecting Insider Threats and placing controls within an organization to protect against digital identity threats.
A strong working knowledge of security threat vectors, networking, network security and application security.
Advanced problem solving skills.
Able to adapt communication style to the audience.
Demonstrates the capability of working in a team environment and collaborating with overseas partners.
Ability to work independently.
Strong leadership skills and qualities which enable you to work with peers and various levels of management.
Certifications such as CISSP, CompTIA Security+, CySA+, CCNA, CEH, GCIH, are desired, but not required.
משרות נוספות שיכולות לעניין אותך