Equifax, Inc.
Cyber Incident Response Analyst
Equifax, Inc., San Jose, California, United States, 95199
Are you passionate about safeguarding information assets and staying one step ahead of cyber threats? As a
Cyber Security Incident Response Analyst , you'll play a pivotal role in our Security Governance and Compliance team. Your expertise will contribute to maintaining compliance with regulations and standards, and you'll analyze complex data to identify and mitigate security risks. Join us in protecting our company's information and ensuring a secure digital environment. What you’ll do: Threat Intelligence Analysis: Analyze complex datasets to produce actionable intelligence, helping us detect and respond to emerging cyber threats effectively. Investigations and Gap Analysis: Support internal investigations by identifying security gaps and strategies, contributing to incident response and risk mitigation. Forensic Analysis: Perform initial forensic analysis to uncover evidence of security incidents, aiding in our incident response efforts. Security Policy and Compliance: Collaborate to develop, monitor, and maintain information security policies, ensuring compliance with regulations and internal standards. Log Analysis and Threat Detection: Utilize various data sources to detect abnormalities, focusing on the internal threat landscape to identify potential breaches. Provide support from Sunday to Thursday from 6 pm to 12 am. What experience you need: Bachelor’s degree in a technical field or equivalent job experience. 3+ years of experience performing cybersecurity incident response investigations, threat intelligence analysis, log analysis, and forensic analysis. 3+ years of experience working with security tools, SIEM solutions, and endpoint security tools. English proficiency B2+ or above (Belt). What could set you apart: Relevant security certifications, such as CompTIA Security+, CompTIA Network+, CompTIA CySA, CISSP, CISM, or CEH showcasing your specialized skills. Strong analytical and problem-solving skills to interpret complex data and provide actionable insights. Creative approaches to identifying new attack vectors and mitigation strategies. Demonstrated ability to manage multiple tasks and projects independently. Experience working with tickets and ticket management systems. Great storytelling and communication skills. Basic coding experience or familiarity with different programming languages. Experience performing malware analysis. Understanding of the MITRE ATT&CK Framework. Passionate desire for continuous learning of information security and physical security practices. Leadership skills and teamwork.
#J-18808-Ljbffr
Cyber Security Incident Response Analyst , you'll play a pivotal role in our Security Governance and Compliance team. Your expertise will contribute to maintaining compliance with regulations and standards, and you'll analyze complex data to identify and mitigate security risks. Join us in protecting our company's information and ensuring a secure digital environment. What you’ll do: Threat Intelligence Analysis: Analyze complex datasets to produce actionable intelligence, helping us detect and respond to emerging cyber threats effectively. Investigations and Gap Analysis: Support internal investigations by identifying security gaps and strategies, contributing to incident response and risk mitigation. Forensic Analysis: Perform initial forensic analysis to uncover evidence of security incidents, aiding in our incident response efforts. Security Policy and Compliance: Collaborate to develop, monitor, and maintain information security policies, ensuring compliance with regulations and internal standards. Log Analysis and Threat Detection: Utilize various data sources to detect abnormalities, focusing on the internal threat landscape to identify potential breaches. Provide support from Sunday to Thursday from 6 pm to 12 am. What experience you need: Bachelor’s degree in a technical field or equivalent job experience. 3+ years of experience performing cybersecurity incident response investigations, threat intelligence analysis, log analysis, and forensic analysis. 3+ years of experience working with security tools, SIEM solutions, and endpoint security tools. English proficiency B2+ or above (Belt). What could set you apart: Relevant security certifications, such as CompTIA Security+, CompTIA Network+, CompTIA CySA, CISSP, CISM, or CEH showcasing your specialized skills. Strong analytical and problem-solving skills to interpret complex data and provide actionable insights. Creative approaches to identifying new attack vectors and mitigation strategies. Demonstrated ability to manage multiple tasks and projects independently. Experience working with tickets and ticket management systems. Great storytelling and communication skills. Basic coding experience or familiarity with different programming languages. Experience performing malware analysis. Understanding of the MITRE ATT&CK Framework. Passionate desire for continuous learning of information security and physical security practices. Leadership skills and teamwork.
#J-18808-Ljbffr