There has never been a better time to join Extreme, after three acquisitions extending our portfolio and go-to-market strategy, we have seen enormous opportunity and growth within the region. Aside from being a Technology Leader in the Gartner Magic Quadrant, we also adamantly promote an internal culture that truly embraces diversity, inclusion, and equality in the workplace. Having Diversity and Inclusion as part of our core values and beliefs, we are proud to foster an environment where every Extreme employee can thrive because of their differences, not despite them.
Job Summary:
As a key member of the Information Security Operations team, you will be primarily responsible for the monitoring & responding to security events & tickets; investigating root cause analysis of issues and updating and investigating threat feeds and alerts; and management and operation of the SIEM (Security Information and Event Management) solution. In addition to the above tasks, you will support the wider information security and IT teams as appropriate on additional requests.
The successful candidate should have a mind set to challenge existing processes, always looking for better ways to achieve the team and business goals through more efficient or updated processes.
As part of the Information Security Operations Team, this role will include on-call shift work over a weekend.
Job Requirements:
- The job requirements include but are not limited to the following tasks.
- This is a L3 level role
- Continuously monitor SIEM Console, ServiceNow incident queues and SecOps dashboards for alerts, tickets, and issues.
- Notify system owners and Escalate security incidents per the incident response escalation procedures.
-
SIEM Administration experience is need for this role. Alert tuning and configuration.
- Monitor devices system performance, system resources utilization (disk space, indexed data) and health monitoring.
- tuning and policy enhancement for SIEM and other SecOp’s tools.
- Responsible for troubleshooting SIEM and SOC (Security Operations Center) operational related issues.
- Assist in case of major outbreak or any critical incident related issue.
- The Incident response team will perform a deep dive incidents analysis by correlating data from the various sources.
- Respond to all reported security incidents.
- Follow up with teams for incident closure.
- Maintain incident records as per the guidelines.
- Capture and protect the evidence related to an incident.
- Develop IoC (Indicators of Compromise) related to new threats.
- Deep-dive investigations including traffic & malware analysis.
- Perform incident damage assessment.
- Update stakeholders about security incidents progress.
- Strong interpersonal communication skills.
- Good verbal and written communication skills.
- Ability to analyze problems and create solutions to Maintain confidentiality of information.
- Must be able to prioritize projects, maintaining a sense of urgency to meet deadlines.
- Must possess the ability to follow verbal and written directions.
- Must be a self-starter and able to work well in independently and in Team.
- Must be able to use critical thinking skills and judgment.
- Must be able to work positively and professionally with a wide range of personalities.
- Must be able to accept constructive criticism.
Working Schedule
- The role will involve providing the primary on-call cover for the weekend during the daytime shifts. The remainder of the 40hr week will be spread out during the Monday to Friday on an agreed schedule, as aligning with the rest of the team.
Experience
- Ideal candidates will have background / experience in security operations. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.
- The ideal candidate should be able to work autonomously and be self-motivated.
- The ideal candidate will have experience using / performing searches and tuning a SIEM product.
- The ideal candidate will have experience with the Microsoft suite of security tools.
- The ideal candidate will have experience in using security incident response frameworks & Mitre framework.
- The requirements listed above are representative of the knowledge, skill and/or ability required.
- Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
Extreme Networks, Inc. (EXTR) creates effortless networking experiences that enable all of us to advance. We push the boundaries of technology leveraging the powers of machine learning, artificial intelligence, analytics, and automation. Over 50,000 customers globally trust our end-to-end, cloud-driven networking solutions and rely on our top-rated services and support to accelerate their digital transformation efforts and deliver progress like never before. For more information, visit Extreme's website or follow us on Twitter, LinkedIn, and Facebook.
We encourage people from underrepresented groups to apply. Come Advance with us! In keeping with our values, no employee or applicant will face discrimination/harassment based on race, color, ancestry, national origin, religion, age, gender, marital domestic partner status, sexual orientation, gender identity, disability status, or veteran status. Above and beyond discrimination/harassment based on “protected categories,” Extreme Networks also strives to prevent other, subtler forms of inappropriate behavior (e.g., stereotyping) from ever gaining a foothold in our organization. Whether blatant or hidden, barriers to success have no place at Extreme Networks.