Manager, Level 2 Threat Response Analyst

Details of the offer

Manager, Level 2 Threat Response Analyst - 2406216047W Description Johnson & Johnson is recruiting for a Manager, Level 2 Threat Response Analyst within the Cyber Security Operations Center (CSOC) supporting the Information Security and Risk Management (ISRM) group located in Raritan, NJ or can work remotely in the USA.
At Johnson & Johnson, we believe health is everything.
Our strength in healthcare innovation empowers us to build a world where complex diseases are prevented, treated, and cured, where treatments are smarter and less invasive, and solutions are personal.
Through our expertise in Innovative Medicine and MedTech, we are uniquely positioned to innovate across the full spectrum of healthcare solutions today to deliver the breakthroughs of tomorrow, and profoundly impact health for humanity.
Learn more at https://www.jnj.com/.
With $82.1 billion in 2020 sales, our company is the world's most comprehensive and broadly based manufacturer of health care products, as well as a provider of related services, for the consumer, pharmaceutical, and medical devices markets.
Employees of the Johnson & Johnson Family of Companies work with partners in health care to touch the lives of over a billion people every day, throughout the world.
If you have the talent and desire to touch the world, Johnson & Johnson has the career opportunities to help make it happen.
Position Summary Are you driven by a sense of purpose?
We are focused, driven, and dedicated to providing world-class Security incident handling services.
On the Cyber Security Operations Center level 1 (CSOC L1)/ level 2 (CSOC L2) team, we continually supervise possible malicious activity on endpoints, servers, networks, applications, databases, websites and other IT systems, looking for malicious activity that could be the indication of a security incident.
We analyze security alerts, assess threat impact and coordinate containment, mitigation and eradication strategies by investing in our people.
Responsibilities include but are not limited to: Responsible for advanced ticket analysis, foundational remediations, and identifying and implementing continuous improvement initiatives Performs secondary investigation of escalations from L1 Analysts providing additional context Utilizing SIEM tools and other security technologies, including monitoring of network traffic, log analysis, and identifying and triaging potential security incidents Actively remediates complex malware infections, persistence mechanisms, and compromised accounts via file quarantine, registry and startup file modifications, and forced password/session revocation within AD Thorough understanding of Cloud and Operational Technology (OT) environments and infrastructure and uses the tools and methods defined in the standard operation procedure (SOP) to validate indicators of compromise and contain/remediate the threat.
Identifies potential gaps in security controls, proposes active mitigations, and implements blocks based on file hash, malicious domain, IP, command line, etc.
Reviews ticket volume for alert tuning and refinement opportunities to drive continuous improvement and automation of detection and remediation Assists SOC manager with metrics gathering, review, and reporting Assists SOC manager in identifying sources of continuous improvement, creation and maintenance of process documentation, and leading training for CI initiatives Responsible for consuming cyber threat intelligence and pursuing continuous education in order to stay current on modern attack vectors and adversaries Qualifications Required: A minimum of a bachelors degree or 11 years of related work experience is required.
A minimum of 7 years of cyber investigation experience.
Excellent executive intelligence writing and briefing skills.
Deep understanding in using SIEM and related tools to conduct investigations.
Knowledge of incident response processes is required.
Strong IT experience with common operating systems, services, networking protocols, logging, attacker techniques and tools is required and the ability to articulate the relationship between the various data sources is required.
Proven track record to identify operational deficiencies and drive corrective actions and plans to address them is required.
A solid grasp of the current threat landscape including the latest tactics, tools, and procedures, common malware variants, and effective techniques for detecting this malicious activity is required.
Superb interpersonal, verbal, and written communication skills are required.
Possessing the credibility and presence to act as subject matter expert is required.
Results Orientation/Sense of Urgency ability to drive to short timelines required.
Creative problem-solving skills required.
This role may require up to 10% travel Preferred: Experience with Cloud Security technologies as Microsoft Azure Security Center, Log Analytics or Azure Sentinel is preferred Knowledge and experience with industrial networks would be a plus.
Experience working with virtual, global teams including diverse groups of people with multifaceted backgrounds and cultural experience is preferred Security certifications in Sec , Network , GCIH, CISSP, CISM, Certified Ethical Hacker, Cybersecurity Practitioner (CSX-P) preferred JNJTech The anticipated base pay range for this position is $99,000 to $170,200.
The Company maintains highly competitive, performance-based compensation programs.
Under current guidelines, this position is eligible for an annual performance bonus in accordance with the terms of the applicable plan.
The annual performance bonus is a cash bonus intended to provide an incentive to achieve annual targeted results by rewarding for individual and the corporations performance over a calendar/performance year.
Bonuses are awarded at the Companys discretion on an individual basis.
Employees and/or eligible dependents may be eligible to participate in the following Company sponsored employee benefit programs: medical, dental, vision, life insurance, short- and long-term disability, business accident insurance, and group legal insurance.
Employees may be eligible to participate in the Companys consolidated retirement plan (pension) and savings plan (401(k)) Employees are eligible for the following time off benefits: Vacation up to 120 hours per calendar year Sick time - up to 40 hours per calendar year; for employees who reside in the State of Washington up to 56 hours per calendar year Holiday pay, including Floating Holidays up to 13 days per calendar year of Work, Personal and Family Time - up to 40 hours per calendar year Additional information can be found through the link below.
https://www.careers.jnj.com/employee-benefits The compensation and benefits information set forth in this posting applies to candidates hired in the United States.
Candidates hired outside the United States will be eligible for compensation and benefits in accordance with their local market."
Primary Location NA-US-New Jersey-Raritan Other Locations NA-United States Organization Johnson & Johnson Services Inc. (6090) Job Function Security & Controls Req ID: 2406216047W


Nominal Salary: To be agreed

Source: Appcast_Ppc

Requirements

Information Security Technician

ABOUT At any given moment, hundreds of complex networked computer systems are operating in tandem to keep ships and submarines operating at their best. The s...


From U.S. Navy - Maryland

Published 7 days ago

Python Private Tutoring Jobs

We are looking for students, professionals, retirees or anyone with a passion to share, to join the largest community of teachers worldwide! If you have free...


From Superprof - Maryland

Published 7 days ago

Full-Stack Engineer At Early-Stage Consumer Social App

Cheez (https://cheez.cc/wayupeng) is a new app that sends you the pictures that your friends take of you, powered by facial recognition. Responsibilities: ...


From Cheez - Maryland

Published 7 days ago

Intelligence And Information Security - Officer Careers - Nj, Pa, De, Md

These careers bring the expertise in all facets of Information Operations, making sure our fleet is capitalizing on the information vulnerabilities of our ad...


From U.S. Navy - Maryland

Published 7 days ago

Built at: 2024-11-06T17:41:55.921Z