Company Description
Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people to realise their financial goals and help them save time and money.
We invest in people and new advanced technologies to unlock the power of data. As a FTSE 100 Index company listed on the London Stock Exchange (EXPN), we have a team of 22,500 people across 32 countries. Our corporate headquarters are in Dublin, Ireland.
Find out what it's like to work for Experian by clicking here
Job Description
As a member of Experian's Global Security Office (EGSO) / Cyber Fusion Center (CFC), you will respond, contain, escalate, investigate, and coordinate mitigation of security events relative to anomalies detected and escalated by the Cyber Fusion Centre (CFC) according to Experian's Incident Response Plan. This team member will join a new, growing team of specialized, advanced responders to support escalations of complex or prioritized matters from Experian's existing 24x7 security monitoring and response functions responsible for responding to and analysing security incidents involving threats targeting Experian information assets.
These threats may include phishing, malware, network attacks, and suspicious activity. You will work with end-users, partners, technical support teams, and management to ensure remediation and recovery from these threats. Use analytics & data collected from endpoints, environmental logging, and a variety of other sources to maximise containment and eradication of threats while expediting recovery of the business.
Please note you will have a regular Monday – Friday schedule with an expectation to participate in on-call schedule or work outside of normal work hours to manage cybersecurity incidents.
You will report to the CFC Senior Director of Incident Management and Security Operations.
Main Responsibilities
* Conduct advanced incident response activities to investigate and contain complex and larger-scale cybersecurity matters (such as potential major severity incidents).
* In the event of investigative matters requiring additional analytical support from teams such as Forensics and Cyber Threat Hunt, work across the teams and hold responsibility for expressing the CFC’s overall understanding of the timeline of attacker activity so that appropriate containment and remediation actions can be coordinated.
* Respond to cyber security events and alerts associated with threats, intrusions, and compromises per any applicable SLOs.
* Manage multiple cases related to security incidents throughout the incident response lifecycle; including Analysis, Containment, Eradication, Recovery, and Lessons Learned.
* Maintain case documentation, including notes, analysis findings, containment steps, and cause for each assigned security incident.
* Maintain an understanding of common Operating Systems (Windows, Linux, Mac OS), Security Technologies (Anti-Virus, Intrusion Prevention), and Networking (Firewalls, Proxies).
* Interpret device and application logs from a variety of sources (e.g. Firewalls, Proxies, Web Servers, System Logs, Splunk, Packet Captures) to identify cause and determine next steps for containment, eradication, and recovery.
* Provide Advanced Support to analysts (Logs review, IP Block questions). Mentor other analysts (process questions, tool usage).
Qualifications
* Experience working within a Security Operations Center or Cyber Security Incident Response Teams may be accepted in lieu of this education requirement.
* Must have knowledge of network protocols (TCP/IP, UDP, ICMP), standard protocols (HTTP/S, DNS, SSH, SMTP, SMB), wireless networking, networking infrastructure, and network topologies (DMZ, VPN, WAN) and network technologies (WAF, IPS, Routers, Firewalls).
* Experience with commercial & open source SIEMs, full packet capture tools, and network analysis tools (Splunk, Wireshark, SOF-ELK).
* Have a demonstrated knowledge of common intrusion methods and cyber-attack tactics, techniques, and procedures (TTPs).
* Exhibit skills using common Incident Response and Security Monitoring applications such as SIEM (Splunk), EDR (FireEye HX, CrowdStrike Falcon, McAfee mVision EDR), WAF, IPS.
Additional Information
Benefits package includes:
* Flexible work environment, working hybrid or in the office if you prefer.
* Great compensation package and discretionary bonus plan.
* Core benefits include pension, Bupa healthcare, sharesave scheme and more.
* 25 days annual leave with 8 bank holidays and 3 volunteering days. You can purchase additional annual leave.
Experian is proud to be an Equal Opportunity and Affirmative Action employer. Innovation is an important part of Experian's DNA and practices, and our diverse workforce drives our success. Everyone can succeed at Experian and bring their whole self to work, irrespective of their gender, ethnicity, religion, colour, sexuality, physical ability or age. If you have a disability or special need that requires accommodation, please let us know at the earliest opportunity.
Find out what it's like to work for Experian by clicking here
#LI-Hybrid
Experian Careers - Creating a better tomorrow together
#J-18808-Ljbffr