About the role :
- Lead content and process development for existing and new cyber defense tools, lead creation and validation of signatures or indicators of compromise (IOCs) which can be implemented on cyber defense network tools in response to new or observed threats.
- Characterize and analyze network traffic, logs, and endpoint activity to identify anomalies, malicious or potential threats to McAfee’s assets.
- Exercise user-oriented approach while handling security incidents to ensure that user impact is minimized as much as possible, and the situation is well articulated to users.
- Document ongoing incidents, after action reports and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
- Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
- Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.
About You
- Looking for 5 to 7 years of experience in leading efforts during one or more phases of Incident Response lifecycle Application of cybersecurity principles and risk management basics to mitigate risk and flexibility to work in US shifts.
- Leading efforts during one or more phases of Incident Response lifecycle Application of cybersecurity principles and risk management basics to mitigate risk.
- Leading & collaborating with multiple teams to drive improvements and resolutions Cloud security monitoring – detection and response (AWS, GCP and Azure).
- Mentoring junior analysts and improving security technologies & processes and take initiatives to drive improvements for security technologies and processes.
- Outstanding knowledge of the Security Operation Center (SOC) & the Information Security Common Body of Knowledge and best practices
- Excellent knowledge of process automation and use of SOAR tools; understanding of webhook and API integration development; Knowledge of Python, PowerShell, and KQL query and programming languages. Experience developing Azure Logic App and Functions.
- Ability to improvise as newer threats emerge and guide teams on threat hunting.
- Preferred certifications: GCIH, GCFA, CEH, Network+, Security+, cloud service provider certifications or equivalent industry standard certifications such as AWS Cloud Practitioner certificate.
We work hard to embrace diversity and inclusion and encourage everyone at McAfee to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees.
- Bonus Program
- Pension and Retirement Plans
- Medical, Dental and Vision Coverage
- Paid Time Off
- Paid Parental Leave
- Support for Community Involvement