
Information Security Analyst - SecOps at G-P. Location Information: Poland. About this Position. The Role:. As . Information Security Analyst - SecOps. , you will be responsible for securing and protecting our infrastructure, including managing and administering various security-related technologies, platforms, and tools. You'll also provide security expertise and guidance to the team on various security-related matters. This will provide subject matter expertise to support the implementation of the company’s security strategy, compliance efforts, and risk-management objectives. Operating with elevated access rights, you are expected to work with a high degree of autonomy, applying sound, risk-based judgement and adhering to industry best practices in both operational and strategic decisions. You will perform enhanced due diligence where required and proactively engage cross-functional teams to ensure adherence to established security processes. Critical tasks must be delivered consistently, transparently, and in alignment with organisational policies and high standards of accountability. . Key Responsibilities:. Investigate alerts, triage, deep dive, and come up with proper action items and remediation plans. . Conduct investigation, containment, and other response activities with business stakeholders and groups.. Compose incident analysis and finding reports for management, including gap identification and recommendations for improvement.. Recommend or develop new detection logic and tune existing sensors/security controls.. Participate in security incident response through in-depth, technical (log, forensic, malware, packet) analysis.. Provide oversight of security alert detection and analysis capabilities across multiple technologies to ensure that security incidents are identified in a timely manner.. Escalate and support potential security incidents in line with appropriate processes.. Support communications of potential security incidents via multiple channels.. Participate in the response of potential security incidents by identifying and communicating relevant supplementary information.. Identify and analyze new and emerging threats to determine impacts to G-P and provide guidelines and recommendations pertaining to opportunities to strengthen G-P security posture.. Assist with information security due diligence requests as needed.. Provide security recommendations to other team members, management, and business stakeholders for solutions, enhancements to existing systems, and new security tools to help mitigate security vulnerabilities and automate repeatable tasks.. What We Are Looking For:. Education: Bachelor’s Degree in Information Technology, Computer Science, Business, or Engineering required, or equivalent experience.. Experience: 5+ years of information security experience, preferably in the technology industry.. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages.. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies and motives.. Familiarity with computer network exploitation and network attack methodologies.. Experience with cloud computing; AWS preferred. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+. Log analysis and security content development in SIEM solutions, e.g. Google SecOps, Splunk, IBM QRadar, LogRhythm, etc.. Endpoint detection and response tools, e.g. CrowdStrike, SentinelOne, Microsoft Defender, etc.. Incident Response playbook development, managing security incident analysis and remediation.. Network-based preventative and detective technologies like Secure Web Gateway, Private Access, IDS/IPS, firewalls, proxy servers, e.g. Netskope, Zscaler, Palo, Versa, etc.. Log analysis and security content development in SIEM solutions, e.g. Google SecOps/Chronicle preferred, Splunk, IBM QRadar, LogRhythm, etc.. Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. . Strong understanding of security as it relates to DevOps (specifically in CI/CD) . Experience in SaaS, multi-tenant customer solutions. . Join G-P and be part of building a global security framework that enables opportunities across the world!