Xerox Security Engineer, Investigations and Threat Intelligence(Analyst II, IM Security) - - 22769 in KOCHI, India
Security Engineer, Investigations and Threat Intelligence(Analyst II, IM Security) at created 20-Jul-2020"/>
Skip to content
Xerox at https://xerox.avature.net/en_US/careers
Security Engineer, Investigations and Threat Intelligence(Analyst II, IM Security)
City: Bangalore, Cochin, Gurugram
State/Province: Haryana, Karnataka, Kerala
Department: IM Security
Date: Monday, July 20, 2020
Working time: Full-time
Job Level: Individual Contributor
Job Type: Experienced
Job Field: IM Security
Description & Requirements
Xerox (NYSE: XRX) makes every day work better. We are a workplace technology company, building and integrating software and hardware for enterprises large and small. As customers seek to manage information across digital and physical platforms, Xerox delivers a seamless, secure and sustainable experience. Whether inventing the copier, the ethernet, the laser printer or more, Xerox has long defined the modern work experience. Learn more at www.xerox.com and explore our commitment to diversity and inclusion. at https://www.xerox.com/en-us/jobs/diversity
Designation: Security Engineer, Investigations and Threat Intelligence (Analyst II, IM Security)
Location : Kochi
Timings: 1 PM to 10 PM(IST)
Experience: 4 to 6 years
Education Requirements: B.E./ B.Tech./ MCA (Cybersecurity, Computer Science, Information Systems, or related field)
Professional Certifications :
Preferred – A technical certification such as GCFE, GREM, CISSP, CISA, or equivalent is desired .
Serve as the primary researcher of threats against the Xerox reputation, brand, and systems through multiple threat intelligence sources and to communicate the same to a network of cyber security practitioners across Xerox for awareness and/or action to mitigate the threat(s).
The Security Intelligence analyst works with the cyber security operations team to make accurate, risk-based decisions on where to focus security efforts that will protect our revenue streams and yield the highest ROI from expended security resources.
1. Maintain a research regimen of continuous monitoring and alerting of threats discovered and/or realized in the industry and analyzing the applicability and potential impact to Xerox systems/resources through:
a . Collect and process both technical and non-technical, internal and external, threat intelligence
b. Attention to detail in gathering pertinent, relevant data instrumental to analyzing applicability across a broad range of resources and stakeholders within Xerox.
c. Maintaining a clear understanding of the Xerox footprint and the relevant technologies that should be monitored for new threats/vulnerabilities, particularly that may escalate our response needs beyond standard security policy/standards for remediation.
d. Communicating both verbally and electronically in a clear, concise, manner being careful to document the immediate ask and /or long-term actions required to neutralize the threat.
e. Develop executive briefings
2 . Maintain integration of threat intelligence sources with the Security Incident & Event Management Tool
3. Maintain the SharePoint communication vehicle for proactive communications and tracking of CSIRT Sev 1 events to closure
a. Support detection and response teams with context and analysis support, provide industry expertise and recommend relevant remediation and countermeasures
4. Monitor threat sources continually based on input from Xerox Product Security, Corporate Security, and threats against systems & software of prevalent use in the conduct of Xerox business.
5. Collaborate with the cyber security incident response team if/when necessary to analyze threats and/or status across the Xerox landscape, supporting incident closure as warranted.
6. Collaborate with the vulnerability management program manager in establishing a robust program to prioritize remediation activities against threats/vulnerabilities specific to the Xerox landscape in light of the current threat intelligence data.
Knowledge and Skills Required
A working knowledge and/or experience in analysis in investigations, such as in IT, law enforcement, military intelligence, or business analytics for at least 2-4 years.
Statistical modeling and analysis experience to infer possible cyber security threats.
Interest in learning about Windows, Linux, Database, Application, Web server, firewall, SIEM etc. log analysis.
Effectively and persuasively communicates security risks in business terms.
Uses discretion in identifying and resolving complex problems, understanding if/when to escalate to a higher level.
Ability to interact with and influence project/program/IT teams in balancing security needs with business needs.
Must be highly motivated with the ability to self-start, prioritize, multi-task and work in a team setting.
Possesses good technical understanding, takes initiative to remain up to date with cyber security skills, and fosters an attitude of continual learning/adapting.
Xerox is an Equal Opportunity Employer and considers applicants for all positions without regard to race, color, creed, religion, ancestry, national origin, age, gender identity, sex, marital status, sexual orientation, physical or mental disability, use of a guide dog or service animal, military/veteran status, citizenship status, basis of genetic information, or any other group protected by law. Learn more at www.xerox.com at https://www.xerox.com/ and explore our commitment to diversity and inclusion! at https://www.xerox.com/en-us/jobs/diversity People with disabilities who need a reasonable accommodation to apply or compete for employment with Xerox may request such accommodation(s) by sending an e-mail to XeroxStaffingAdminCenter@xerox.com. Be sure to include your name, the job you are interested in, and the accommodation you are seeking.
© 2020 Xerox Corporation. All rights reserved. Xerox® and Xerox and Design® are trademarks of Xerox Corporation in the United States and/or other countries.
Share this job:
Share Security Engineer, Investigations and Threat Intelligence(Analyst II, IM Security) with Facebook
Share Security Engineer, Investigations and Threat Intelligence(Analyst II, IM Security) with LinkedIn
Share Security Engineer, Investigations and Threat Intelligence(Analyst II, IM Security) with Twitter
Share Security Engineer, Investigations and Threat Intelligence(Analyst II, IM Security) with a friend via e-mail