**Job Description**:
**Overview**
Nearly every aspect of TD SYNNEX business is driven by Information Technology from inventory planning, logistics, order management, configuration, shipping, invoicing and settlement. Our systems are a high transactional volume environment with a significant amount of our revenue derived through our eBusiness services.
**Working here is your opportunity to shape an industry.**
We understand the importance of a system that works together. Your expertise, drive and passion can help us improve everything we touch, from providers to customers as well as our employees. Join our team of leaders to begin a rewarding career.
Cyber Security Defense Analyst uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur within the network in order to protect information, information systems, and networks from threats. The Cyber Security Defense Analyst recognizes corollary or potentially related events to identify trends and impacts to the organization's security posture and proactively mitigates associated risks.
We are searching for a
**Cyber Security Defense Analyst** to join our growing
**Responsibilities**
- Characterize and analyze logs, events and traffic to identify anomalous or malicious activity and potential threats to company resources.
- Capture and analyze system and event logs associated with anomalous or malicious activities using security monitoring tools.
- Collect intrusion artifacts and use discovered data to enable mitigation of potential cyber incidents within the enterprise.
- Conduct research, analysis, and correlation across a wide variety of all source data sets including indications and warnings.
- Security incident handling, and perform deep investigation.
- Maintain a good understanding of the function and content of information security policies, standards, procedures, and practices as well as the threats, risks and vulnerabilities at a functional level.
- Conduct periodic information security policy, standards, regulatory, and governance compliance reviews and testing and/or risk assessments throughout the organization and in accordance with the business plan.
- Provide knowledgeable support to IT or business unit constituents in area of detection and protection of threats and provide support in case of incident
- Provide development effort as required. Conduct training sessions and assist more junior staff in preparing for presentations and training sessions.
- Ensure thorough validation of current and/or new policy, standards, regulatory, and compliance requirements.
- Investigate opportunities to update security processes to sustain and enhance network and system security detection and protection capabilities
- Must be available for schedule work including providing on-call support
**Qualifications/Education - Minimum Requirements**
- Typically has 4+ years relevant experience
- 4-year degree in computer science or related field or equivalent experience
**Critical Skills**
- Defensive Cyber Operations monitoring experience and execution of associated processes.
- It must have a solid understanding of cyber defensive technologies required to protect, detect and respond to cyber threats and attacks. Technologies include SIEM, vulnerability assessment, discovery, infrastructure (firewall, IPS/IDS, proxy, network capture), host based security, forensics, etc.
- Use and implementation of IOCs across many platforms
- Excellent problem-solving and technical skills
- Sound analytical abilities.
- Sound problem-solving skills.
- Experience with ticketing and case management solutions
- Meticulous attention to detail
- Ability to multi-task, troubleshoot, and prioritize
- A deep understanding of how hackers work and ability to keep up with the fast pace of change in the criminal cyber-underworld
- Detail-oriented, self-motivated and disciplined, with excellent time management skills
- Ability to seek out vulnerabilities in IT infrastructures
**Additional Knowledge & Skills**
- Previous work experience in a Security Operations Center
- Cyber Threat Intelligence
- Relevant security certifications (CISSP, CISA, GIAC, Security Plus)
- Automation and orchestration
- Scripting experience - Python, Powershell, etc.
- Regular expressions
- Cloud and Office 365 Security Experience
- Proven hands-on experience with Security tools Intrusion Prevention, Endpoint Protection, Security Incident handling and threat hunting.
**What's In It For You?**
- ** Elective Benefits**: Our programs are tailored to your country to best accommodate your lifestyle.
- ** Grow Your Career**:Accelerate your path to success (and keep up with the future) with formal programs on leadership and professional development, and many more on-demand courses.
- ** Elevate Your Personal Well-Being**: Boost your financial, physical, and mental well-being through seminars, events, and our global Life Empowerment Assistance Program.
- *