( Principal Cybersecurity ) Tj Maxx Work From Home Jobs @ Jobinus Apply Now!!

Full Time29-May-2023
Overview

Job Responsibilities: Principal Cybersecurity

Salary: $20-$30/Hour

Company: Tj Maxx

Location: Madison, USA

Educational Requirements: Bachelor's Degree

 

Discovery is at the heart of everything we do. Anywhere you find us around the world if you could consider a product, you can likely find it in our stores, which include TJ Maxx, Marshalls, HomeGoods, Sierra, Winners, Homesense, and TK Maxx. With range comes masses of glad surprises—our surroundings are ever-changing, and that’s simply how we find it irresistible. Each day is an opportunity to discover something new approximately our business, our partnerships, and even something exciting approximately your self. Geared up to discover distinctive?

WHAT YOU’LL DO

The Cybersecurity Alert reaction team fulfills a vital position for IT safety – monitoring, alerting, and responding to detected security alerts. The crew partners with safety & other IT-era proprietors to expand protection tracking and alerting techniques and implementations that fast pick out security threats and turn them into action to defend blanketed IT assets, which includes information, gadgets, and infrastructure. We are looking for an influenced and experienced danger content & Automation Analyst to help us mature our security monitoring and detection abilities.

As a threat content material & Automation Analyst, you may define strategies for turning safety alerts into detections, generating alerts for presentation to alert analysts who, in turn, verify and take suitable action. You'll partner with leaders in different IT protection offerings along with threat Actor Emulation and threat hunting to make sure that the right defenses exist for commonplace, regarded protection threats in our surroundings and additionally ensure that we can ward off many chance actors. Safety era groups will paint with you to make sure that any era’s built-in detections can be treated as it should be by using operations groups, and that we are able to construct custom detections whilst required. Subsequently, you’ll play a key position in constructing and enforcing an automation approach, integrating the use of protection orchestration, automation, & response (bounce) generation to provide contextual data and make alert analysis greater green, making our protection defenses more powerful with velocity.

WHAT YOU’LL WANT

Our crew is searching out people with a passion for cyber security, intellectual interest, and willingness to force higher answers and get results. We want associates who might be acquainted with fostering a strong collaborative environment in excessive-stress situations, responding with suitable velocity and urgency to essential protection issues. You’ll want to understand a few of the most common technology used for security monitoring & alerting, which includes deep information on SIEM and bounce generation software in a big-scale environment, together with common styles for security detection.

SUCCESSFUL APPLICANTS WILL HAVE:

  • A minimum of eight years of IT security revel in
  • Bachelor’s degree or equivalent experience in Cyber security, statistics generation, records warranty, or a related field
  • Experience in cybersecurity hazard operations, along with the tactics of collection, processing, correlation, alerting, and response moves taken in defense of big-scale cloud and on-prem application surroundings
  • Know-how and know-how in key SIEM and leap techniques and technology which includes Splunk, Splunk enterprise safety (ES), Anvilogic, Palo Alto Cortex XSOAR, and different related technology.
  • Information and know-how in common programming languages utilized in protection technology integration: Splunk Search Processing Language (SPL), Python, square/KQL, and simple scripting (Powershell, Bash)
  • A sturdy aptitude and a “can-do” mindset, with a willingness to educate different era groups on a way to first-class generate appropriate safety signals for coping with means of cybersecurity hazard operations groups

PREFERRED QUALIFICATIONS

  • Master’s diploma or equal experience in Cyber security, data generation, records guarantee, or a related area
  • Direct, relevant revel in safety Operations middle (SOC) content development and automation implementations
  • Certifications together with CISSP, CompTIA safety+, and many others.
  • Familiarity with the NIST Cyber Security Framework (CSF), common protection controls and their purposes, and technology that supply those controls