Skip to main content
Posted March 07, 2022
Thorlabs

Sr. Security Operations Analyst

Newton, NJ, USA Full Time

We are currently seeking a Senior Security Operations Center Analyst based out of our Newton NJ, Jessup MD, and remote locations. This position will...

We are currently seeking a Senior Security Operations Center Analyst based out of our Newton NJ, Jessup MD, and remote locations. This position will report to the Global Information Security Manager. The Sr. Security Operations Analyst uses his knowledge of information system security to provide highly ethical evaluation and support of security systems and designs. This role will routinely monitor all systems, perform compliance and configuration auditing, and investigate cyber security activity to reduce the threats and risks to the business.

Essential Job Functions include the following, but are not limited to:

  • Perform the ongoing monitoring of security and compliance related systems and identify and address security events, including driving investigation and remediation.
  • Leverage and improve on security operational tools.
  • Correlate and analyze network information from various sources and communicate the findings to peers and supervisors.
  • Conduct security audits, threat hunting, perform vulnerability and penetration testing and assessments, drive remediation efforts, and develop controls and processes based on the identified risks.
  • Support the development and implementation of security policies, standards, playbooks, and guidelines.
  • Support the design and implementation of secure solutions and activities as required.
  • Maintain situational awareness of emerging cyber trends by reviewing open-source reports for recent vulnerabilities, malware, and other threats that have the potential to impact the organization.

Qualifications

Experience:

  • General overall experience: Data center security operations, software development (Dev-ops).
  • Experienced in Linux, Windows and proprietary operating systems, and management of enterprise network equipment and firewalls.
  • Experienced with auditing tools: OpenVas, Solarwinds LEM, NMAP, Wireshark/Netmon, Metasploit, Kali, Airwave, Microsoft Sentinel, Defender, Varonis, FortiAnalyser, FortiManager, Cisco Firesight, Cisco ISE, Cisco Firesight, Kali.

Education:

  • Education: Degree in Computer Science/Engineering or related discipline, 5 years of related experience in an information technology security role.
  • Certification(s) similar or related to the following: CCNA Security, Certified Ethical Hacker (CEH). Certified Information Security Professional (CISSP).
  • Previous Security Operations Center (SOC) experience.
  • The analyst should have a broad technical and architectural knowledge of information technology areas. This individual works in collaboration with other information system members to identify, mitigate, and reduce security risks.
  • The ideal candidate has superior hands-on experience to search, identify, and mitigate root cause security events using a diverse set of methods and tools

Specialized Knowledge and Skills:

  • Understanding of network architectures and security control frameworks in traditional and cloud/hybrid environments.
  • Networking and/or computer science experience including a broad knowledge in IP networking protocols, encryption protocols, cyber security, web development, and secure system engineering.
  • Strong working knowledge of Windows services (AD/NTFS/GPO/DNS/DHCP), system hardening baselines, networking, security assessments, wireless networks, IPS/IDS and firewalls.
  • Strong analytical skills: ability to interpret and identify unusual activity from live data and logs.
  • Experience in basic forensic event handling, and incident response methods.
  • Skill in performing data capture and packet-level analysis.
  • Proficient in scripting and or object-oriented languages such as: Python, Visual Basic, PowerShell.
  • Experience in utilizing vulnerability and penetration testing principles, tools, and techniques.
  • Understanding of the plethora of threats, attacks methods, and exploitation; and the measures to minimize those risks.
  • Knowledge of cyber-attack stages (reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, evasion methods)
  • Knowledge of regulatory frameworks (PCI, SAS94, NIST, CIS, GDPR, CMMC).
  • Strong writing and communications skills.

Thorlabs values its diverse environment and is proud to be an Equal Employment Opportunity/Affirmative Action Employer. All qualified individuals will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age or veteran status. Job descriptions are not intended as and do not create employment contracts. The organization maintains its status as an at-will employer. Employees can be terminated for any reason not prohibited by law.

This listing expired on Apr 06. Applications are no longer accepted.

Below are some other jobs we think you might be interested in.