Bachelor’s degree or above in information security, cybersecurity, software engineering, computer science, information technology, or related field
Sufficient knowledge and skills across cyber security domains including User Behavior Analysis, Malware Basics, Log Analysis and Correlation, Enterprise Endpoint Security and Email Security, Network Security (IPS/IDS), Security protocols, and Operating Systems (Windows, Unix, Linux)
Solid understanding of the security threat landscape and threat models
Solid understanding of MITRE ATT&CK/Cyber Kill Chain
Experience working with Security Information and Event Management (SIEM) platforms, Security Orchestration Automation and Response (SOAR) platforms, or similar technologies (preferred; opportunity for experience through internal learning)
Skills in log analysis and data mining, and preferably skills in programming or scripting languages like Python, PowerShell, Rust, or Go
Preferred certifications: Certified SOC Analyst (CSA), CompTIA Cybersecurity Analyst (CySA+), or similar (opportunity to obtain through internal learning)
History of solving hard problems with creative solutions
Ability to communicate technical concepts to teammates and non-technical colleagues
Understanding of DevOps methodologies and practices
Experience using JIRA, Confluence
Responsibilities
Proactively protect networks, applications, and infrastructure from cyber threats
Perform security alert triage and incident management activities
Drive detection, analysis, and provide guidance on the remediation of discovered vulnerabilities
Perform base security analysis and relevant follow-up actions to contain and remediate cyber threats and recover P&G assets from security-related events and alarms
Work closely with the Penetration Test Team, Cyber Hunt Team, Threat Intel, and other internal organizations to enhance the company’s cyber security posture
Understand and evaluate the threat landscape risk and consult on remediation steps
Use tools to analyze and respond to incidents, and proactively enhance the cyber security posture of the company
Effectively communicate technical information to non-technical audiences and influence others to comply with policies, standards, and best practices
Confirm that incidents are adequately documented, including summary of analysis performed, actions taken, and additional steps needed to fully close/resolve incidents