Join Juniper Networks' Cyber Fusion team as a Cybersecurity Analyst to protect Juniper's intellectual property and infrastructure from cyber events. Utilize industry-leading technology to detect, respond, and recover from attacks. Apply root cause analysis and lessons learned to proactively protect against known adversary tactics. Report to the Threat Fusion & Response Director.
Job description
Role: Cybersecurity Analyst 4
Juniper Networks’ Cyber Fusion is looking for a certified cybersecurity professional to join our highly collaborative, and diverse team of talent. Our mission is to provide operationally excellent next-generation information security event monitoring, threat hunting, and incident response services that protect Juniper’s intellectual property (IP) and infrastructure from adverse cyber events. As an Cybersecurity Analyst, you will report to the Threat Fusion & Response Director. In this role you will utilize industry leading technology to detect, respond, and recover from advanced attacks and apply root cause analysis and lessons learned to proactively protect against known adversary tactics, techniques, and procedures, prevent impact of Juniper’s assets, and control recurrence of incidents.
Experience
- On the job experience or a combination of work and education for 5-6 years dedicated to IT, information security, or security infrastructure
- A degree/certification in in the information security field OR
- Certification(s) demonstrating a core competency in the area of Information Security Incident Handling and threat hunting
Responsibilities
In this role, you will:
- Provide advanced network intrusion monitoring and response. This will include performing security incident risk assessment and severity declaration.
- Perform expert level endpoint detection and response (EDR)
- Analyze application and web security events
- Interpret logs for expert level threat hunting to identify and respond to indicators of compromise (IOCs) and threats including User and Event Behavioral Analytics (UEBA) using a security information and event management (SIEM) environment
- Perform incident response containment
- Help develop and utilize a Security Orchestration, Automation, and Response (SOAR) of information security incidents – currently using Service Now.
- Respond and facilitate expert level tier-3 incident management; mobilize security incident response team (CIRT) of key stakeholders; communicate and notify at all levels of the organization; perform post-incident activity involving root cause analysis (RCA) and lesson learned assessments and identify owners of correction action plans (CAP)
- Formulation of security operation incident response plan, operational procedures, desk level procedures, and operational level agreements
- Yield security compliance evidence
Knowledge
Experience
- Requires a degree or equivalent experience
- Requires at least <X> years of prior relevant experience
- Certification(s) demonstrating a core competency in the area of cybersecurity Incident Handling and threat hunting
Technical
- Security Incident Handling & Response
- Security information event management (SIEM) searching
- Data analytics
- Intrusion detection and network tools; Wireshark, Nmap
- Web proxies
- Cloud access security broker (CASB)
- VMware and virtualization platforms
- Database activity monitoring
- Application security
- Anti-virus and malware detection
- Social engineering and phishing detection
- Identity & Access Management
- Host-base forensics
- Threat hunting
Soft Skills
- Effective verbal and non-verbal communication skills at all levels of the organization
- Leadership teamwork and collaboration
- Trustworthiness and discretion
- Problem solving
- Critical Thinking
- Self-initiated/sufficient
- Motivated
Our Values
- Be Bold: Explore Fearlessly, Pursue Simplicity, Seek Diverse Idea
- Build Trust: Own It, Create Customer Success, Champion Authenticity
- Diver Excellence: Obsess About Quality, Act With Urgency, Improve Relentlessly