Cybersecurity Monitoring Analyst
Role details
Job location
Tech stack
Job description
As businesses leverage digitalization opportunities, their cyber-attack surface structurally increases, which can lead to business disruptions, data breaches and brand damage. High profile industry incidents show that these risks are real, and this has turned cyber resilience into a topic for Boards.
As part of the Information Risk Management (IRM) function in Shell, the Cyberdefence capability has specific focus on identifying cyber threats, discovery of IT vulnerabilities, monitoring for cyber intrusions and response to security incidents. Shell Cyberdefence is responsible for defending Shell against advanced Cyber-attacks through monitoring for advanced Cyber threats, discovery of vulnerabilities and investigating global Cyber incidents. This organization is part of Information Risk Management (IRM) function in Shell IT Services and Operations.
As a Cybersecurity Monitoring Analyst, you will support Cyberdefence by performing incident response and investigations into Cybersecurity incidents., As part of the Cyberdefence capability the global Monitoring team´s focus is to monitor real-time for cyber intrusions based on indicators of compromise or anomalies from normal behavior and raise security incidents where necessary. As a Cybersecurity Monitoring Analyst, you are responsible for detecting and reporting on potential Information Security events of interest in the IT infrastructure and the use of IT services through the selection, deployment, and improvement of monitoring tools, the incident management processes which support all security, BID and code of conduct incidents involving IT infrastructure and the rapid and effective resolution of incidents involving ITSO and IT suppliers.
Real-time Monitoring
-
Ensure continuous monitoring of the Shell IT landscape for cyber breaches, performing triage and analysis of events.
-
Ensure a proper balance between raising suspicious behaviors and raising too many false positives.
-
Together with the Incident Lead and Threat and Analytics Lead create a feedback loop to enhance the monitoring technology.
-
Ensure proper handover takes place between Asia-Pac, Europe and US regions to create a near 24/7 coverage of monitoring.
Deliver and Monitoring Services
-
Efficiently and effectively monitor the Shell IT estate for Information Security breaches (using Splunk, FireEye, RSA, etc).
-
Support the implementation of new infrastructure monitoring tools, both retained and outsourced.
-
Proactively monitor and support performance improvement of all retained and outsourced monitoring tools (IDS, desktop monitoring agents, Netflow, DLP, Proxy, etc).
-
Perform data harvesting in support of investigations performed by Business Integrity, IRM, Legal and HR.
-
Report vulnerabilities to businesses and suppliers and drive short term remediation.
-
Analyze monitoring data to detect threats and vulnerabilities and recommend structural improvements.
Operating the Shell Incident Management and Monitoring Process
-
Operate part of the IRM incident processes, and support improvement activities.
-
Provide triage, data acquisition, analysis and advice on all incidents to help rapidly diagnose problems and identify immediate treatment.
-
Handle data harvesting request and ensure suppliers follow the agreed process.
-
Maintain an up-to-date register of data sources, harvesting methods, accountabilities and timescales.
-
Support the deployment of tools to support security monitoring, harvesting and analysis.
Requirements
As a Cybersecurity Monitoring Analyst, we do not have to tell you to have knowledge of Windows, Unix or Linux. You know your way around computers. However, if you want to succeed in this role you recognize yourself in the following:
- Experience in Information Security or related IT roles.
- Demonstrable experience performing incident response and IT forensic investigations.
- Strong analytical ability and attention to detail coupled with a broad understanding of all stages of Information Risk Management framework development.
- Understanding of monitoring tools such ArcSight, Splunk (ES), Network monitoring tools, IDS systems and Incident Response tools.
- Moderate knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc)
- Relevant certifications such as, CISSP, SANS and preferably:
- GCIH: GIAC Certified Incident Handler
- GCIA: GIAC Certified Intrusion Analyst
- GCFA: GIAC Certified Forensic Analyst
- GREM: GIAC Reverse Engineering Malware
- Offensive Security Certified Professional - OSCP Certification
- Offensive Security Wireless Professional - OSWP Certification
- Offensive Security Certified Expert - OSCE Certification
- Offensive Security Exploitation Expert - OSEE Certification
- Offensive Security Web Expert - OSWE Certification
- Basic to Moderate knowledge of malware operation and indicators, of current threat landscape (threat actors, APT, cyber-crime, etc)
- Basic to Moderate protocol analysis experience (Wireshark, RSA Netwitness, etc.)
- Basic knowledge and experience of Data Loss Prevention monitoring, scripting, forensic techniques and audit requirements (PCI, HIPPA, SOX, etc.)