|Company||The Hershey Company|
|Location||US Remote / Hershey, PA|
|Preferred GIAC Certifications||GSEC, GCIH, GCIA, GPEN, GDAT, GICSP, GRID|
Location: Hershey, PA preferred but willing to do remote for the right US-based candidate.
Summary: As a Security Engineering Analyst, you help protect network boundaries, keep computer systems and network devices hardened against attacks and provide security services to maintain the confidentiality, integrity, and availability of the Hershey network environment.
The ideal candidate must be a self-starter, customer-focused, team player, and be able to coordinate and collaborate on multiple issues simultaneously with many stakeholders. Candidate must have relevant networking experience (e.g. TCP/IP stack, DNS, BGP, metadata, IDS/IPS, and enterprise firewalls). Experience install and managing security measures and operate software to protect systems, information infrastructure, and data integrity. Participate in process of uncover network vulnerabilities and reporting. Understand security event identification and known threat validation analysis. Candidates must have expertise in security information and event management tools, collecting and analyzing host-based (Windows, Linux, or Solaris) and network-based data, using Computer Network Defense or forensic tools, gathering and interpreting information, performing Internet research, identifying mitigation strategies, and effectively communicating results. Should have demonstrated analytic ability to discover unknown, suspicious or exploitation activity and analyze exploitation opportunities and expertise to evaluate and recommend information security enhancements, product upgrades, and tools to ensure minimal exposures. Excellent communications skills, that include the ability to provide formal documentation of analysis and/or research results to include briefings, reports, writing, knowledge transfer to junior Analysts, and editing at a technical/professional level, are required.
Experience and familiar with type of network attacks as it relates to implementing protect and detective measures.
Perform log analysis and event management (SIEM) practices
Report to IT Management on security gaps, issues, failures or concerns of established application or infrastructure frameworks and architecture to remediate and provide early solutions to problems
Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses
Prepare system security reports by collecting, analyzing, and summarizing data and trends, to include recommendations
Monitor threat intelligence sources to ensure protective countermeasures are in place
Consult with senior engineers, data architects, and developers to ensure effective security is achieved across the enterprise technologies
Keep current with security technologies and make recommendations for use based on value
Collaborate with members of the technical architecture community to ensure successful implementation of cyber defense strategies that align and support the enterprise
Act as a key cyber defense strategic advisor to the IT Leadership Team, and other key stakeholders regarding security initiatives, risk mitigation, and compliance
Act as the lead for Incident Response for security incidents across the global enterprise
Use strong critical thinking and analytical skills and demonstrated ability to identify risks associated with IT business processes, security operations, and technology projects
Have strong analysis, oral and written communication, and change management skills
Work with system owners to contain intrusions and recover compromised systems
Work with risk teams to identify gaps and form a roadmap to evolve Hershey’s security defenses to match sophisticated attackers
Knowledge of forensics tools
Provide performance metrics as necessary
Design, develop, and implement technical solutions to mitigate security risks
Advocate security and secure practices throughout Hershey
Be subject matter expert in multiple cyber defense subject areas
Ability to develop and maintain highly effective relationships, internally and externally
Education: BS in Computer Science, Information Security or related field OR equivalent work experience (6 years of experience)
One of the following security certifications: CISSP, Security+, GSEC, GCIH, GCIA, or CISM
Experience:2-6 years Information Security or Cyber Defense