Remember, if you do disable or delete cookies, you may not have access to the full functionality of our website.
This cookie is automatically generated by applications based on the PHP language. This cookie is a general purpose identifier used to maintain user session variables.
_ga, _gcl_au, _gid
Universal Analytics (Google)
These cookies are used to collect information about how visitors use our website. We use the information to compile reports and to help us improve the website. The cookies collect information in an anonymous form, including the number of visitors to the website and blog, where visitors have come to the website from and the pages they visited.
BizoID, bcookie, lang, UserMatchHistory, lidc
These are browser ID cookies dropped on our site by LinkedIn. They allow us to track visitor behavior on the LinkedIn campaigns, together with the interactions on our web pages including time spent on the site, how far users scroll down and where they go after this site.
This cookie is set by Marketo. This allows a website to track visitor behavior on the sites on which the cookie is installed and to link a visitor to the recipient of an email marketing campaign, to measure campaign effectiveness. Tracking is performed anonymously until a user identifies himself by submitting a form.
Used in conjunction with the Twitter social plugins in order to allow to help Twitter improve and understand how people use its services, including Twitter buttons and widgets, and Twitter Ads.
As an Information Security Analyst with Netcracker, this role will require you to continually adapt to be a step ahead of cyber-attacks. Staying up to date on the latest methods, would be cyber-attackers are using to infiltrate computer systems and on IT security. This role also involves plans to restore proper IT functioning, after any major incident. IS Analysts continually test the steps within the enterprise systems recovery plans. This team is part of a global 24x7 operation and shift work will be involved. At times, this position may require to be on call outside of normal business hours.
This position can sit remote, within the United States.
Role and Responsibilities:
Monitoring and analyzing security logs from multiple sources, such as SIEM, DLP, IDS/IPS, , Antivirus, firewalls, system logs and others, then escalating any relevant security issues to the appropriate areas
Monitoring logs from various systems, looking for security breaches indicated by abnormal patterns, direct warning alerts or unusual down times.
SIEM Correlation experience. (Connecting the dots from one group of systems/platform in SIEM to another group of systems/platform in SIEM correlating the events into an incident). Funneling events into an Incident.
Perform assessments of systems and networks within the enclave and identify where those systems/networks deviate from acceptable configurations, enclave policy, or local policy.
Conduct passive evaluations (compliance audits) and active evaluations (penetration tests and/or vulnerability assessments).
Strong understanding of Networking fundamentals, traffic and operating systems (Windows & Unix/Linux)
Monitor their organization’s networks for security breaches and investigate a violation when one occurs
Prepare reports that document security breaches and the extent of the damage caused by the breaches
IT Security domain experience; preferably in data analytics or security analytics
Research the latest information technology (IT) security trends
Help plan and carry out an organization’s way of handling security
Develop security standards and best practices for their organization
Recommend security enhancements to management or senior IT staff
Help computer users when they need to install or learn about new security products and procedures
Experience & Requirements:
2-5 years of experience working with Information Security, specifically with SIEM products at a corporate environment.
Advanced Degree with concentration in Information Security or Cyber Security (preferred)
Security + Certification or any Security related certifications. (preferred)
Bachelor’s Degree in Computer Science or other Technical Engineering discipline, with a concentration in Information Security or Cyber Security.
Are you someone who enjoys working with next generation technology, interacting with best in class global teams, and working with the largest digital transformations in the world? This opportunity will combine them all while offering a competitive salary and accelerated career growth opportunities.
Join Netcracker Technology to work for a forward-looking software company, offering mission-critical solutions to service providers around the globe. Our comprehensive portfolio of software solutions and professional services enables large-scale digital transformations, unlocking the opportunities of the cloud, analytics, virtualization and 5G mobile networks. With an unbroken service delivery track record of more than 25 years, our unique combination of technology, people and expertise helps companies transform their networks and enable better experiences for their customers.
Apply for this job
Please submit a detailed CV and fill out all the fields in the form.
We help you focus on the most important step you'll take. Your next one.
Take your strategy, your operations, and your business forward today.