Loading...
Share this Job

Senior Analyst - Cyber Security Job

Apply now »
Apply now

Apply for Job

Date: Sep 29, 2021

Location: New Delhi, HR, IN

Company: Boston Scientific

Additional Locations:

 

 

Purpose and Passion • Comprehensive Benefits • Life-Work Integration • Community • Career Growth

At Boston Scientific, you will find a collaborative culture driven by a passion for innovation that keeps us connected on the most essential level. With determination, imagination and a deep caring for human life, we’re solving some of the most important healthcare industry challenges. Together, we’re one global team committed to making a difference in people’s lives around the world. This is a place where you can find a career with meaningful purpose—improving lives through your life’s work.

 

Purpose:

 

The Cyber Security Analyst (Splunk Specialist) is responsible for managing, maintaining, and growing BSC’s Splunk instance. Responsibilities include taking care of SIEM & Logging architecture, administration, support, and engineering. Linux administration, as well as general system and application troubleshooting will also be involved.

 

The Analyst should also be open to work on SIEM related AWS & Azure Sentinel Environment as per the business requirement.

 

The Splunk Specialist will work closely with our security operations center analysts. Candidate must have a strong technical background, demonstrate intuitive problem-solving skills, and have proficient communication skills.

 

The person will also be responsible for proactively finding, investigating, and mitigating advanced cyber threats targeting Boston Scientific. These responsibilities are accomplished through a combination of network traffic monitoring and analysis, proactive computer defense (CND) intelligence operations, cyber investigations, incident management, and malware analysis.

 

In order to effectively execute these tasks, the Cyber Security Threat Analyst develops good working relationships with IT Infrastructure and IT security, desktop support personnel and other stakeholders throughout the Enterprise. The Analyst also provides situational awareness to appropriate personnel through clear and concise communications.

 

 

Key Responsibilities:

 

Splunk Role (Primary Focus) -

 

  • Sound knowledge of Splunk Architecture, administration, support and maintenance.
  • SME for all aspects of Splunk and log management for the IT security team.
  • Lead and coordinate implementation of Splunk over Cloud or AWS.
  • Onboarding new data sources into Splunk.
  • Splunk tuning and use case development.
  • Splunk ES alert and content creation/tuning.
  • Assist SOC with training for monitoring of Splunk ES instance.              
  • Assist with various other implementation tasks.
  • Knowledge of AWS and Azure Sentinel is a plus.

 

 

 

 

Incident Responder Role (Secondary Focus) ->

 

  • Focus on conducting full spectrum threat analysis resulting from CND Intelligence Operations information, threat reporting and ongoing incidents affecting the enterprise from advanced cyber threats.
  • Should have exposure of handling investigations of security incidents over cloud infrastructure as per the Cloud Security best practices.
  • Encourages investigations and research initiatives to move toward a more proactive state, resulting in advanced warning of cyber-attack, enhanced understanding of adversary collection requirements and new threat indicators that facilitate proactive threat discovery and mitigation.
  • Must take the lead on providing situational awareness to appropriate personnel through clear and concise communications and promotes a proactive response to possible threats by staying current with, analyzing and identifying mitigations for emerging threats to Boston Scientific’s IT Infrastructure.
  • Malware Analysis using a defined set of analytical tools.
  • Can Serve on call when assigned.
  • Communicate effectively with peers and other key stakeholders.
  •  Increase organizational threat awareness by providing briefings as required.
  • Report findings and provide countermeasure recommendations and business cases based on standard security principles, policies, standards, and industry best practices.
  • Promote a proactive approach to the changing threat landscape.
  • Evaluate and recommend new security technologies, processes, and methodologies.
  • Maintain and continually evaluate cyber threat intelligence sources for changes that increase effectiveness and timeliness.

 

Qualifications:

 

  • Computer Science or Information Systems major related field experience with networking and IT Security.
  • 7+ Years of Experience leading enterprise-level responses for major information security incidents.
  • 3+ years of hands-on Splunk management experience is required.
  • Experience with Splunk ES is highly desirable.
  • Splunk certification and formal training is highly desirable.
  • Good communication skills and experience answering inquiries is a must.
  • Ability to read and understand system data, including, but not limited to, security event logs, Netflow and database structures.
  • Understanding of analyzing forensic data concerning system and network security compromises.
  • Experience with IT Security tools such as Anti-Malware, EDR, Web Proxy, Anti Phishing Mail Gateway, Firewalls is a plus.
  • Working knowledge of network/malware analysis is a plus.
  • GIAC, CISSP, CEH, Security+ certifications are a plus.

 

 

About us

As a global medical technology leader for more than 35 years, our mission at Boston Scientific (NYSE: BSX) is to transform lives through innovative medical solutions that improve the health of patients. If you’re looking to truly make a difference to people both around the world and around the corner, there’s no better place to make it happen.

 

Requisition ID: 492501

 


Job Segment: Medical, Engineer, Medical Technology, Information Systems, Computer Science, Healthcare, Engineering, Technology