Conduct analysis of artifacts to determine methods of intrusion and best course of resolution while driving security improvement
Strong Incident Response knowledge and experience
Theoretical and practical knowledge of macOS, Linux, Windows operating systems and cloud environments
Experience with security data collection, analysis, and correlation
Strong analytical, qualitative, and quantitative reasoning skills
Demonstrated creative problem-solving abilities
Security event monitoring, investigation, and overall incident response process
Investigate potential cybersecurity events across multiple environments using various tools and techniques
Develop information security policies, standards, and procedures
Manage time effectively while balancing multiple activities and mentoring junior analysts as needed
Understanding of offensive security and common attack methods
Ability to pivot across multiple datasets to correlate artifacts related to a single security event
Experience in both product security and information security including:
Organizational structure and administration practices
System development and maintenance procedures
System software and hardware security controls
Access controls
Computer operations
Physical and environmental controls
Backup and recovery procedures
Detailed knowledge of security and regulatory frameworks (CRI, ISO 27001, NIST 800 series, FFIEC, SOC2, STAR, etc.)
Support compliance inquiries from IT risk management and internal/external auditors
Create reports analyzing trends and activities inside and outside the organization
Develop security detections, playbooks, and automation aligned with best practices
Review internal logs and alerts to identify potential cybersecurity events
Triage cases from automated alerts and escalate when required
Monitor external service provider activity for cybersecurity risks
Analyze real-time security data to identify and prevent threats
Remediate compromised systems to a clean state
Perform breach indicator assessments and investigate malicious network traffic
Assist with internal or third-party employee investigations
Produce reports identifying emerging and ongoing threats
Research evolving threats, tools, vulnerabilities, and industry best practices
Stay current with security program developments and industry trends
Bachelor s degree in Information Technology, Cyber Security, Computer Science, or related field
5+ years of experience in Cybersecurity Operations or Information Security
Relevant certifications preferred (CISSP, ISSMP, SANS, GIAC, GCIA, CISM, CEH, GCFA, GCFE, GCIH, GSEC)
Experience in one or more domains:
Incident Response & Forensics
Security Governance & Oversight
Security Risk Management
Network Security
Threat & Vulnerability Management
Experience with information security risk management, audits, and assessments
Fluency in both Japanese and English required