Intrusion Analyst III

Apply Now

Company: Walmart

Location: Reston, VA 20191

Description:

What you'll do...

Position: Intrusion Analyst III

Job Location: 10780 Parkridge Blvd, Reston, VA 20191

Duties: Software architecture; Distributed systems; Scalability; Design patterns; Disaster Recovery; Tec Stacks; Non-Functional Requirements; Security standards, frameworks, and methodologies (System Security Plan -SSP, Security Risk and Compliance Review- SRCR etc.) and assist in creation of simple, modular, extensible and functional design for the product/solution in adherence to the requirements. Evaluate trade-offs while designing across multiple components in a system based on the business requirements. Convert HLD to create detailed design for specific modules / components of a product/system. Understand nuances of designing for disaster recovery. Cyber Risk Management: Cyber risk assessment and management techniques; Security risks, threats and vulnerabilities; Possible treatments of security risks, threats and vulnerabilities; Evolving security landscape and emerging cyber security threats; Assessment of potential business risks from security gaps. To contribute towards development of cyber risk assessment and/or management techniques to identify security gaps and weaknesses in the business. Designs cyber risk assessments by consolidating insights from the business and various functions. Identifies cyber security risks, threats and vulnerabilities, and their impact on the organization. Identifies possible treatments for cyber risks, threats and vulnerabilities identified. Identifies and propose implementation of endorsed mitigation measures to address security gaps. Network Operations: Network Monitoring and Alerting tools; Monitoring Metrics and KPIs (for example Availability, mean time between Failure (MTBF), Mean Time to Recover (MTTR) etc.); Service Level Indicator (SLIs) (for example request latency, availability, error rate etc.) To review network performance and determine areas for improvement to optimize and align network performance with business needs. Identify gaps and recommend changes to address missing or sub optimal areas of monitoring. Set altering priorities by identifying the most important systems based on their criticality. Monitor the function and performance infrastructure services have on platform level components and applications. Right-size IT resources to meet current and future business requirements in a cost-effective within a domain/ pillar. Network Design: Architectural blueprint design; Evaluate and balance industry standards and best practices with business needs of network - infrastructure designs; Identify optimal topologies, platforms, and protocols; Document associated design decisions and trade-offs. To analyze organization requirements to determine the infrastructure network parameters and policies needed to support them. Evaluate and optimize network designs created by the team on performance based on expected business needs, usage and traffic volume. Evaluate and document design specific KPIs and Service Level Objectives (SLOs). Establish the SLOs/Service Level Agreement (SLAs) to determine the availability goals of the network systems/services.

Minimum education and experience required: Bachelor's degree or the equivalent in Computer Science, Information Technology, Engineering, or related field plus 2 years of experience in intrusion analysis or related experience.

Skills required: Must have experience with: Conducting code reviews and writing scripts in Python and PowerShell; Collecting and analyzing security event logs using a SIEM tool; Mapping Adversary Tactics, Techniques and Procedure (TTP) to MITRE ATT&CK framework; Conducting Change Management process using Service Now; Identifying and hunt for Indicators of Compromise (IoC) using SIEM tools; Analyzing Windows and Linux systems using Sy internal Suite and PowerShell; Performing root cause analysis for incident tickets; Static and dynamic malware analysis; Analyzing malicious activity in memory using Volatility; Health of servers/other components of IT infrastructure using monitoring tools; Coding in a database programming language (Structured Query Language- SQL); Performing Network Vulnerability Assessments using NMAP; Creating and maintaining knowledge articles and SOPs; Resolving remote Windows machine's software issues using Open-source software; Analyzing email headers to detect phishing emails. Employer will accept any amount of experience with the required skills.

Wal-Mart is an Equal Opportunity Employer.

Similar Jobs