Sysco

Analyst (Tier 2) - Security Operations

Sysco Poland Full time

JOB DESCRIPTION

Job Title: Analyst (Tier 2) - Security Operations

Location: Kraków, Poland

Responsibilities and Duties

  • Analyst (Tier 2) - Security Operations must be able to do the following:
    • Correlate threat data from various sources to establish the threat/impact against the network.
    • After assessment of the data, recommend appropriate countermeasures, facilitating tracking, preliminary handling of investigations, and reporting of all security events and computer incidents.
    • Remediation actions and apply lessons learned to security incident investigation and resolution
    • Perform monitoring, identification and resolution of security events to detect threats through analysis, investigations and prioritization of events based on risk/exposure
    • Develop processes which analyzes data, producing accurate, meaningful, easily interpreted results based on user requirements and use cases
    • Develop processes which align with enterprise incident response activities and coordinate closely with other teams within the Security Operations Center
    • Create custom tool content to enhance capabilities of security operations teams
    • Manage the collection, documentation and research of security events generated by the SOC monitoring platform and infrastructure
    • Provide support to Security Incident Management aligned with NIST standards

Technical writing experience

  • Standard Operating Procedures
  • Runbooks/Playbooks
  • Incident Response Plans
  • Support training develop with both analysts and tabletop exercises
  • Assist or lead the effort in Tool configuration and content creation

Qualifications:

  • 2-4 years of experience on one of the following team(s): Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC)
  • Degree in Computer Science, Information Technology, or equivalent work experience
  • Experience supporting Cyber Security Operations in a large enterprise environment
  • Experience with Incident Response, analysis of network traffic, log analysis, ability to prioritize and differentiate between potential intrusion attempts and false alarms, managing and tracking investigations to resolution
  • Experience with SIEM & Log Management solution
  • Familiarity with one of the following; NIST Incident Response Lifecycle, Cyber Kill Chain, Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) Metrics
  • CCNA Security, GCIA, GCIH, CYSA+, Security+ or other related security certifications
  • At minimum there must be one active security certification

Experience with one or more of the following tools:

  • Qradar SIEM/Cortex XSOAR
  • SentinelOne
  • Proofpoint Email
  • Azure Suite
  • Zscaler

Working Hours

  • 09.00 am to 07.00 pm local time

Why Join Us

  • Be part of a global cybersecurity team protecting a dynamic enterprise environment.
  • Opportunity to work with modern security technologies and drive tool innovation.
  • Collaborative culture with professional development opportunities.
  • Hybrid work model with our Kraków office as the primary location.