• Tirane, ofroj vend pune cyber Security Analyst (remote)

As a Security Analyst you will be part of the Security Operations Center team working with events and incidents as they come in. You will be monitoring infiltration attempts, analyzing logs, looking for patterns to ensure infiltration attempts are identified and dealt with in a timely manner. You will identify attack patterns and how to defend against them. You will be part of our global security operations center that follows a follow-the-sun structure, working to ensure continuous monitoring, detection and response to security events affecting Ultimate Software and our customers. You will work closely with our security operations centers in Fort Lauderdale, Singapore, and Paris.


Due to the nature of the work, you are required to have on-call duties on weekends. Additional work hours may also be required during an incident investigation.


Primary/Essential Duties and Key Responsibilities:


Continuously monitor assets and respond to active threats to and within the enterprise
Detect, report, assess, and respond to information security incidents.
Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
Read, interpret, write, modify, and execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems (e.g., those that perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data).
Monitor and analyze data flow to identify and block malicious behavior and activities
Communicate in English: write clearly and speak authoritatively to different audiences (business leaders and engineers)
Provide 24/7 monitoring
Required Qualifications:


Knowledge of operating systems.
Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).
Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. Knowledge of network traffic analysis methods
Understand the applicability of software vulnerabilities
Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
Strong analytical skills
Ability to communicate and write in English professionally
Experience, Education, Certification, License and Training


Associate degree in computer science or a related discipline
Fresh graduate or working professional with less than 3 years of relevant work experience
Preferred Qualifications:


Knowledge of security event correlation tools.
Knowledge of the common attack vectors on the network layer. Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
Skill in performing packet-level analysis.
Skill in using security event correlation tools.
Skill in reading and interpreting signatures (e.g., snort).
Experience in open source development is a plus
Experience working in a global organization is a plus
Physical Requirements:


Work is primarily sedentary, although there may be some carrying of books, printouts, manuals, files, and equipment.
Travel Requirements:


15-25%


This job description has been written to provide an accurate reflection of the current job and to include the general nature of work performed. It is not designed to contain a comprehensive detailed inventory of all duties, responsibilities, and qualifications required of the employees assigned to the job. Management reserves the right to revise the job or require that other or different tasks be performed when circumstances change.


Ultimate Software will reasonably accommodate employees with disabilities as defined by the Rehabilitation Act of 1973, the Americans with Disabilities Act (ADA) and other appropriate statutes. If you are an applicant and need a reasonable accommodation when applying for job opportunities within the Company or request a reasonable accommodation to utilize the Company’s online


Cel. : tfosorcimlml@gmail.com
 


Apply
Back
Top