職位描述
Incident Response Security Analyst (Blue Team) with Splunk Expertise
Job Summary:
We are seeking a highly skilled Incident Response Security Analyst (Blue Team) with extensive experience in Splunk and cybersecurity. The ideal candidate will have a minimum of 3 years of experience in security operations, incident response, and Splunk platform management. This role involves proactive defense of our technological infrastructure, threat detection, incident response, and maintaining the stability of our analytics platform.
Key Responsibilities:
- Threat Detection & Monitoring: Monitor security tools to identify suspicious activities and potential threats.
Analyze threat intelligence (CTI) to identify trends and patterns for developing custom detections and enhancements to existing telemetry tools.
- Incident Response: Analyze and respond to security incidents, coordinating efforts to mitigate impact and prevent recurrence. Perform digital forensic investigations to determine the scope and impact of security breaches.
- Splunk Platform Management: Lead the management of the Splunk platform, including maintaining its health and stability. Configure and implement Splunk applications and custom field extractions, lookups, and dashboards.
Ensure the platform supports SOC and Blue Team operations effectively.
- Collaboration & Reporting: Work closely with other departments to integrate security practices throughout the system lifecycle. Provide technical support to SOC and Blue Team members.
Education:
Degree in Computer Science, Systems Engineering, Cybersecurity, or related fields.
CHFI, CEH, CompTIA Security+, GSEC, or other relevant certifications.
Experience:
At least 3 years of experience in a similar role within a CSIRT or security team.
Expertise in Splunk architecture and core components (Heavy Forwarders, Universal Forwarders, Configuration Manager).
Certifications (Preferred):
Technical Skills:
Strong knowledge of EDR tools, IPS/IDS/NDR systems, and SIEM technologies.
Scripting/programming skills (Python, Bash, PowerShell, etc.).
Administration experience in UNIX and Windows environments.
Familiarity with cybersecurity frameworks (NIST, ISO 27001, MITRE ATT&CK).
Desirable Skills:
Experience with Cribl, Databricks (Spark), and related tools.
Specific knowledge in cybersecurity concepts and practices.
Languages:
Fluent in spoken and written English for communication with vendors and cross-functional teams.
Soft Skills:
Strong analytical and problem-solving abilities.
Excellent written and verbal communication skills.
Ability to work collaboratively in a team environment and manage multiple priorities.
Proactive, action-oriented, and passionate about cybersecurity.