Remote - Cyber Security Operations Analyst
Role : Cyber Security Operations Analyst Location : San Jose, CA (Hybrid) Duration : 12 Months Client : Samsung Semiconductor Note: Hands on experience with Netskope CASB is must. Description Cyber Security Operations Analyst is responsible for safeguarding information system assets by identifying and solving potential and actual security problems to ensure the confidentiality, integrity, and availability of IT resources and their associated data Location: Hybrid, working onsite at our San Jose headquarter 3 days per week, with the flexibility to work remotely the remainder of your time Analyze and track the cyber threat landscape, including identifying and investigating cyber threats actors and their activities to enhance cyber security posture.
Perform security monitoring, security event triage, and incident response using SIEM and CASB solutions. Analyze alert patterns to provide recommendations for policy improvement. Create content (queries, dashboards, reports, etc.) in security tools like Splunk SIEM, Netskope CASB, DLP & others.Respond to daily security incidents following established incident response methodology. Identify, monitor, and present data points which includes daily dashboards, metrics, and reporting. Ensure continuous improvement of security operations processes and procedures.
Create and maintain technical documentation for existing security tools and solutions. Conduct incident response activities as appropriate including triage, root cause analysis, kill chain analysis, escalations, notifications, and communication with the relevant parties.
Perform threat hunting across the network for proactive detection of anomalous events and possible intrusions/attacks. Work on Cyber Security projects providing technical support and guidance to IT and other teams. Identify gaps in IT infrastructure by providing insight into advanced threat attackers TTPs Enhance department and organization reputation by delivering quality results and exploring opportunities to increase value and raise awareness of Cyber Security Program.
Balance concurrent projects with ongoing operational responsibilities. Stay informed on recent security trends and vulnerabilities, and proactively apply this knowledge to reduce risk. Requirements What You Bring 2+ years of work experience in Security Operations, Threat Intelligence, or Incident Response.
Bachelor's degree in computer science, Information Systems, cyber security or relevant field. Hands-on experience with Splunk Enterprise Security, Netskope CASB solution & Enterprise Immunity Solutions is preferred. Extensive knowledge in two or more of the following Security tools: SIEM, CASB, Advanced DLP, SOAR, EDR, Email Gateway, Enterprise Immune System.
Relevant security certifications or vendor certifications in the above security tools is preferred. Understanding of TCP/IP networking, and network services such as DNS, SMTP, DHCP, etc. Hands on experience with networking commands or any scripting language in existing role.
Advanced understanding of business processes, internal control risk management, IT controls, audit, and related standards. Energetic, analytical and keen problem solver who works well in a collaborative environment. Strong ability to manage multiple demands, with a strong sense of accountability and urgency.
You're inclusive, adapting your style to the situation and diverse global norms of our people. An avid learner, you approach challenges with curiosity and resilience, seeking data to help build understanding. You're collaborative, building relationships, humbly offering support and openly welcoming approaches.
Innovative and creative, you proactively explore new ideas and adapt quickly to change.