Position: Intrusion Analyst III
Job Location: 10780 Parkridge Blvd, Reston, VA 20191
Duties: Software architecture; Distributed systems; Scalability; Design patterns; Disaster Recovery; Tec Stacks; Non-Functional Requirements; Security standards, frameworks, and methodologies (System Security Plan -SSP, Security Risk and Compliance Review- SRCR etc.) and assist in creation of simple, modular, extensible and functional design for the product/solution in adherence to the requirements. Evaluate trade-offs while designing across multiple components in a system based on the business requirements. Convert HLD to create detailed design for specific modules / components of a product/system. Understand nuances of designing for disaster recovery. Cyber Risk Management: Cyber risk assessment and management techniques; Security risks, threats and vulnerabilities; Possible treatments of security risks, threats and vulnerabilities; Evolving security landscape and emerging cyber security threats; Assessment of potential business risks from security gaps. To contribute towards development of cyber risk assessment and/or management techniques to identify security gaps and weaknesses in the business. Designs cyber risk assessments by consolidating insights from the business and various functions. Identifies cyber security risks, threats and vulnerabilities, and their impact on the organization. Identifies possible treatments for cyber risks, threats and vulnerabilities identified. Identifies and propose implementation of endorsed mitigation measures to address security gaps. Network Operations: Network Monitoring and Alerting tools; Monitoring Metrics and KPIs (for example Availability, mean time between Failure (MTBF), Mean Time to Recover (MTTR) etc.); Service Level Indicator (SLIs) (for example request latency, availability, error rate etc.) To review network performance and determine areas for improvement to optimize and align network performance with business needs. Identify gaps and recommend changes to address missing or sub optimal areas of monitoring. Set altering priorities by identifying the most important systems based on their criticality. Monitor the function and performance infrastructure services have on platform level components and applications. Right-size IT resources to meet current and future business requirements in a cost-effective within a domain/ pillar. Network Design: Architectural blueprint design; Evaluate and balance industry standards and best practices with business needs of network - infrastructure designs; Identify optimal topologies, platforms, and protocols; Document associated design decisions and trade-offs. To analyze organization requirements to determine the infrastructure network parameters and policies needed to support them. Evaluate and optimize network designs created by the team on performance based on expected business needs, usage and traffic volume. Evaluate and document design specific KPIs and Service Level Objectives (SLOs). Establish the SLOs/Service Level Agreement (SLAs) to determine the availability goals of the network systems/services.
Minimum education and experience required: Bachelor’s degree or the equivalent in Computer Science, Information Technology, Engineering, or related field plus 2 years of experience in intrusion analysis or related experience.
Skills required: Must have experience with: Conducting code reviews and writing scripts in Python and PowerShell; Collecting and analyzing security event logs using a SIEM tool; Mapping Adversary Tactics, Techniques and Procedure (TTP) to MITRE ATT&CK framework; Conducting Change Management process using Service Now; Identifying and hunt for Indicators of Compromise (IoC) using SIEM tools; Analyzing Windows and Linux systems using Sy internal Suite and PowerShell; Performing root cause analysis for incident tickets; Static and dynamic malware analysis; Analyzing malicious activity in memory using Volatility; Health of servers/other components of IT infrastructure using monitoring tools; Coding in a database programming language (Structured Query Language- SQL); Performing Network Vulnerability Assessments using NMAP; Creating and maintaining knowledge articles and SOPs; Resolving remote Windows machine's software issues using Open-source software; Analyzing email headers to detect phishing emails. Employer will accept any amount of experience with the required skills.
Wal-Mart is an Equal Opportunity Employer.
If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.
If you're looking to take your career to the next level, joining Wal-Mart as an Intrusion Analyst III in Reston, VA, might be the perfect opportunity for you! In this role, you'll dive deep into the world of software architecture and develop strategies around distributed systems and scalability. You’ll be dissecting complex security standards and frameworks to ensure our systems are robust against emerging cyber threats. One of your key responsibilities will be to lead cyber risk assessments, identifying vulnerabilities and proposing effective treatment plans. You will leverage your analytical skills to improve network operations and optimize performance metrics. Your experience in Python, PowerShell, and SIEM tools will be vital as you conduct security event log analyses and manage change processes. There’s a great emphasis on teamwork and collaboration, as you’ll work closely with various business functions to design modular, extensible solutions while maintaining a focus on robust disaster recovery plans. If you have a knack for coding and enjoy working on both Windows and Linux systems, this position offers a fulfilling blend of technical challenges and strategic thinking. Let your expertise shine as you contribute to keeping our systems secure, while being part of a company that values your growth and knowledge in the dynamic field of cybersecurity.
Join Soft Tech Consulting as a Technical Delivery Manager to bridge technical strategy and execution in the cloud migration of critical IT applications.
Be a key player in Intel's supply chain transformation as a Windchill Enterprise Applications Analyst, facilitating internal foundry capabilities.
Bosch is looking for a Junior IT Security Analyst to enhance data protection and compliance efforts within their innovative team.
As a Site Reliability Engineer II at Forcepoint, you will play a crucial role in incident management and the automation of cloud services.
As a Services Architect II at Ingram Micro, you will play a critical role in designing service delivery frameworks and engaging with clients to meet their technology requirements.
An innovative firm seeking a NetSuite & Systems Administrator to enhance their operational efficiency and data management in an onsite capacity.
Join the Teachers' Retirement System in New York City as an IT Service Desk Summer Intern and support vital IT services for educators.
Cognizant is looking for an AS400 Technical Lead/Manager to lead project coordination and drive deliverables in a hybrid environment.
"To save people money so they can live better.”
7140 jobsSubscribe to Rise newsletter