Extreme Networks Named to Computerworld’s 2023 List of Best Places to Work in IT!
Over 50,000 customers globally trust our end-to-end, cloud-driven networking solutions and rely on our top-rated services and support to accelerate their digital transformation efforts and deliver progress like never before and with double digit growth year over year, no provider is better positioned to deliver better outcomes on scale, than Extreme.
We believe in “walking the walk” of our strong core values which enable us to successfully advance together. Diversity and Inclusion is a vital part of our values and beliefs, and we’re proud to foster an environment where every Extreme employee can thrive.
Come become part of something big with us! We are a global leader, with hubs in North America, South America, Asia Pacific, Europe, and the Middle East.
We are considering candidates in the following States/Geographies: West Coast, Alaska, Utah, North and South Dakota
There has never been a better time to join Extreme, after three acquisitions extending our portfolio and go to market strategy, we have seen enormous opportunity and growth within the region. Aside from being a Technology Leader in the Gartner Magic Quadrant, we also adamantly promote an internal culture that truly embraces diversity, inclusion, and equality in the workplace. Having Diversity and Inclusion as part of our core values and beliefs, we are proud to foster an environment where every Extreme employee can thrive because of their differences, not despite them.
Job Summary:
As a key member of the Information Security Operations team, you will be primarily responsible for the monitoring & responding to security events & tickets; investigating root cause analysis of issues and updating and investigating threat feeds and alerts; and management and operation of the SIEM (Security Information and Event Management) solution. In addition to the above tasks, you will support the wider information security and IT teams as appropriate on additional requests.
The successful candidate should have a mind set to challenge existing processes, always looking for better ways to achieve the team and business goals through more efficient or updated processes.
As part of the Information Security Operations Team, this role will include on-call shift work over a weekend.
Job Requirements:
The job requirements include but are not limited to the following tasks.
- Continuously monitor SIEM Console, ServiceNow incident queues and SecOps dashboards for alerts, tickets, and issues
- Notify system owners and Escalate security incidents per the incident response escalation procedure.
- SIEM Alert tuning and configuration
- Monitor devices system performance, system resources utilization (disk space, indexed data) and health monitoring.
- Add, configure new log, and event sources into SecOp’s tools.
- Fine tuning and policy enhancement for SIEM and other SecOp’s tools.
- Responsible for troubleshooting SIEM and SOC (Security Operations Center) operational related issues
- Assist in case of major outbreak or any critical incident related issue.
- SIEM Patching and configuration back up operations.
- The Incident response team will perform a deep dive incidents analysis by correlating data from the various sources.
- Respond to all reported security incidents.
- Follow up with teams for incident closure.
- Maintain incident records as per the guidelines.
- Capture and protect the evidence related to an incident.
- Develop IoC (Indicators of Compromise) related to new threats.
- First level investigation and malware analysis
- Perform incident damage assessment.
- Update stakeholders about security incidents progress
- Strong interpersonal communication skills
- Good verbal and written communication skills
- Ability to analyze problems and create solutions Maintain confidentiality of information.
- Must be able to prioritize projects, maintaining a sense of urgency to meet deadlines.
- Must possess the ability to follow verbal and written directions.
- Must be a self-starter and able to work well in independently and in Team.
- Must be able to use critical thinking skills and judgment.
- Must be able to work positively and professionally with a wide range of personalities.
- Must be able to accept constructive criticism.
Experience
- Ideal candidates will have background / experience in security operations. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.
- The ideal candidate should be able to work autonomously and be self-motivated.
- The ideal candidate will have experience using / performing searches and tuning a SIEM product.
- The ideal candidate will have experience with the Microsoft suite of security tools.
- The ideal candidate will have experience in using the Mitre framework.
- The requirements listed above are representative of the knowledge, skill and/or ability required.
- Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
Salary Range - $64000 to $80000
Salary Range - $64000 to $80000
Extreme Networks, Inc. (EXTR) creates effortless networking experiences that enable all of us to advance. We push the boundaries of technology leveraging the powers of machine learning, artificial intelligence, analytics, and automation. Over 50,000 customers globally trust our end-to-end, cloud-driven networking solutions and rely on our top-rated services and support to accelerate their digital transformation efforts and deliver progress like never before. For more information, visit Extreme's website or follow us on Twitter, LinkedIn, and Facebook.
We encourage people from underrepresented groups to apply. Come Advance with us! In keeping with our values, no employee or applicant will face discrimination/harassment based on: race, color, ancestry, national origin, religion, age, gender, marital domestic partner status, sexual orientation, gender identity, disability status, or veteran status. Above and beyond discrimination/harassment based on “protected categories,” Extreme Networks also strives to prevent other, subtler forms of inappropriate behavior (e.g., stereotyping) from ever gaining a foothold in our organization. Whether blatant or hidden, barriers to success have no place at Extreme Networks.