Sr Security Operations Analyst

Job Locations US-TX-Irving
Posted Date 4 weeks ago(10/30/2020 1:48 PM)
ID
2020-95436
Function
Information Systems

Overview

Who we are

Imagine working in a place where continuous improvement and innovation is celebrated and rewarded; where fast-paced, high-impact teams come together to positively drive results for one of the largest & most iconic brands in the world.

 

As the only rapidly growing retailer, you may know us as your friendly neighborhood store. You probably know our familiar name, have seen our pervasive logo, and have tried our highly sought-after products, such as Slurpee® and Big Bite®.  “Brain Freeze” is a 7-Eleven registered trademark for our 53-year old Slurpee® and with over 67,000 stores globally (more than any other retailer or food service provider), we sell over 14 million a month.

 

But there’s a lot more to our story and much more left to be written.  We are transforming our business, ensuring we are customer obsessed and digitally enabled to seamlessly link our brick and mortar stores with digital products and services. 

 

At 7-Eleven the entrepreneurial spirit is in our DNA and has been ever since our inception 90+ years ago. It’s what drove us to invent the convenience industry in 1927 by envisioning how a simple ice dock could provide household staples such as milk and eggs to better serve the needs of our customers.

 

Today we are redefining convenience and the customer experience in big ways...we are fundamentally changing our culture and we want talented, innovative, customer obsessed, and entrepreneurial people like you to come make history with us

 

How we lead

At 7-Eleven we are guided by our Leadership Principles.

  1. Be Customer Obsessed
  2. Be Courageous with Your Point of View
  3. Challenge the Status Quo
  4. Act Like an Entrepreneur
  5. Have an “It Can Be Done” Attitude
  6. Do the Right Thing
  7. Be Accountable

Each principle has a defined set of behaviors which help guide the 7-Eleven team to Serve Customers and Support Stores.

 

About This Opportunity

Responsibilities

The Senior Analyst shall have demonstrated professional experience in incident detection and response, malware analysis, or cyber forensics, and a bachelor's degree (or equivalent years’ experience) in Information Technology, Cybersecurity, Computer Science, or related field.

  • The ability to do deep-dive investigations on complex incidents.
  • Creating and maintaining system documentation for security event processing.
  • Author Standard Operating Procedures (SOPs),  run books, and training documentation.
  • Confirming event collection, enrichment, and correlation, and escalating issues to a separate SIEM engineering team.
  • Assist in developing high performance, false positive free, search criteria for SIEM analysis.
  • Participates in technical meetings and working groups to address issues related to malware, threats, vulnerabilities, and issues of cybersecurity and preparedness.
  • Integrating SOAR (D3, Phantom, Demisto) into various processes and tools.
  • Supports various audits and legal requests.
  • Document all activities during an incident and providing leadership with status updates during the life cycle of the incident.
  • Train and mentored junior analysts.
  • Assist in the evaluation of new products, tools, and procedures.

Qualifications

  • 5-7+ years of experience working with various security methodologies and processes.
  • Candidate should have industry standard accreditations or professional licenses equivalent to their experience that is verifiable.
  • Advanced knowledge of TCP/IP protocols.
  • Experience configuring and optimizing various technical security solutions.
  • Extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices; and expert knowledge in two or more of the following areas related to cybersecurity:
    • Continuous diagnostics and mitigation
    • Intrusion Prevention and Detection
    • Access Control and Authorization
    • Endpoint Protection
    • Application Security
    • Protocol Analysis
    • Incident Response
    • Encryption
    • Web‐filtering
    • Advanced Threat Protection
    • Data Loss Prevention
    • Cloud security

 

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed