Overview

Jr. Detection & Response Analyst Jobs in Plano, Texas, USA at Toyota Tsusho Systems

Title: Jr. Detection & Response Analyst

Company: Toyota Tsusho Systems

Location: Plano, Texas, USA

Type: Full Time

Category: IT/Tech, Security

Toyota Tsusho Systems

This is the official website of Toyota Tsusho Systems Corporation (TTS), the global ICT company of the Toyota Tsusho Group.

We are seeking a highly motivated and experienced Junior Incident Detection & Response Analyst with 3-5 years of experience to join ourdynamicCyber Fusion Center Incident Detection team. This position is ideal for a candidate who is at the start of their cybersecurity career, bringing both basic SOC knowledge and experience of detecting threats & anomalies, as well as a strong passion for security and willingness to grow their skillset.

The successful candidate will be responsible for monitoring and responding to alerts to help prevent and mitigate cyberattacks.

Essential Functions:

Work in 24×7 Cyber Fusion Center to provide monitoring and detection/response services. Work various 10-hour shifts, including weekends and work both day and night shifts. Shifts rotate quarterly.

Use Splunk/MS Sentinel for name search pattern & workbook in Sentinel for customer understanding in log/event correlations & built search queries in Splunk/Sentinel.

Detect and respond to security incidents by leveraging detection/response platforms.

Triage security incidents and perform in-depth analysis using cyber threat intelligence, intrusion detection systems, firewalls and other boundary protection devices.

Escalate cybersecurity events according to playbooks and standard operation procedures (SOPs).

Support Incident Response efforts as needed, including providing counsel, working with the IR team, as well as other involved stakeholders within the organization and customers to drive forward remediation activities.

Assist with containment and remediation of threats during incidents. Use internal ticketing system to track investigated incidents and capture relevant details.

Conduct threat hunting activities based on internal and external threat intelligence.

Assist with service requests from customers and internal teams.

Identify, recommend, coordinate, and deliver timely knowledge to support teams.

Report all information to the supervisor and upper management with updates as requested and respond to requests for information and assistance, including project progress and problems, particularly as needed to change in schedule, resources and scopes.

Contribute to the creation of documentation to standardize processes and procedures, including playbooks to improve internal processes and procedures.

Work with team to establish repeatable and constantly improving processes.

Serve as mentor and provide training to other team members as needed.

Other tasks and responsibilities as assigned byleadership.

Requirements

RequiredEducation& Experience:

At least 3 years of cybersecurity experience with a focus on Incident Detection, Incident Response and/or Security Operations.

BA/BS in Computer Science, Information Security, or Information Systems or equivalent related work experience.

Experience interfacing with internal and external customers, providing remediation actions to non-technical.

Working knowledge of enterprise-level security technologies such as SIEM and ticketing systems.

Experience in a highlycollaborative environmentwith a focus on project delivery and desired business outcomes.

Experience with Sentinel and other SIEM platforms, enterprise intrusionpreventionsystems, endpoint detection and response tools, and other security products.

Preferred Qualifications:

Security cert…

 

Upload your CV/resume or any other relevant file. Max. file size: 800 MB.