Security Threat Analyst | Apple - Singapore

Job Details:
Apple is seeking an Information Security analyst to join its security monitoring and threat analysis team. The ideal candidate will possess a strong technical background and information security experience and will focus on detection and response. You will work with a team of analysts on daily operational monitoring and escalation of information security events and also function as an intrusion analyst to examine security events for context, risk, and criticality. This person will have the opportunity to work on technology and processes with a global reach. This role is an integral part of the security controls that Apple uses to protect its customers, brand and data.
Key Qualifications
*. At least 2 years of experience in Information Security with focus on Incident Response and/or Intrusion Detection
*. Security operations, incident analysis, network security monitoring, log analysis, and intrusion detection
*. Experience in system administrati on, scripting, TCP/IP, networking, and security hardening
*. Experience with security event management /SIEM and case management systems
*. Ability to acquire in-depth knowledge of network and host security technologies
*. Ability to analyze event logs, live response data and network traffic patterns quickly
*. In-depth knowledge of industry standard information security domains
*. Technical and industry certifications are a plus (CISSP, GIAC, CCNP/CCIE)
*. Experienced in working in enterprise IT and datacenter environment s
*. Demonstrate d ability to work in a team environment
*. Excellent verbal and written communicati on skills
*. Strong interpersona l skills
*. Ability to adjust to changes in business priorities and work hours/shifts
• Investigate suspicious security event activity
• Represent Apple’s Information Security interests while building and maintaining successful relationships across multiple business units
• Data analytics and log correlation
• Research new and emerging threats to gain insight and understanding of the evolving threat landscape
• Participate in post incident reviews and root cause analysis
• Ensure that all monitoring and activity reports run successfully
• Review and modify the security technology rules and filters to improve intrusion detection systems
• Develop and implement automation and application logic for security correlation purposes
• Develop, document, and communicate security operations procedures and processes to internal IT and Information Security personnel
• Ability to work on shifts -- before or after normal business hours
BS in Computer Science..
..More Details» [Apply]

»Follow @CareerSpaceInfo..

»Subscribe to
»Follow CareerSpaceInfo[G+]..

No comments: