Tijuana - Information Security Threat Hunter
hace 1 semana
By living according to a common set of values, we create a culture that unifies, embraces the uniqueness we all bring to the company, and positions Integer for long-term success.
At Integer, our values are embedded in everything we do.
**Customer**
We focus on our customers’ success
**Innovation**
We create better solutions
**Collaboration**
We create success together
**Inclusion**
We always interact with others respectfully
**Candor**
We are open and honest with one another
**Integrity**
We do the right things and do things right
**Accountabilities & Responsibilities**:
- Adheres to Integer’s Values and all safety, environmental, security and quality requirements including, but not limited to: Quality Management Systems (QMS), Safety, Environmental and Security Management Systems, U.S. Food and Drug Administration (FDA) regulations, company policies and operating procedures, and other regulatory requirements.
- Actively hunts for potential threats. Translates findings into an iterative process and deploys them in the SIEM and EDR solutions.
- Build, implement, and deploy detections, automations, and alerts using modern software engineering
- Review alerts generated by detection infrastructure for false positives and modify alerts as needed (Tuning)
- Develop, plan, lead and participate in Purple Team/Tabletop Exercises focusing on and discovering and mitigating emerging threats
- Analyze, Deploy and Prioritize new Threat Intel
- Design and implement Insider Threat program
- Develop and document new threat hunting strategies to increase our capabilities and find new threats
- Create detailed Incident Reports and contribute to lessons learned in collaboration with the appropriate team
- Keep up to date with information security news, techniques, and trends
- Collaborate with the SOC Team members to contain and investigate major incidents
- Provide simple and reusable hunt tactics and techniques to a team of security engineers and SOC analysts
- Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs (Tactics, Techniques, and Procedures)
- Responsible for continuously researching, assessing and prioritizing cyber threats based on internal and external relevance, and impact
- Other duties as assigned
**Education & Experience**:
- **Minimum Education**:Bachelor’s Degree in Computer Science, or equivalent (6+ years) work experience.
- **Minimum Experience**:4+ years of experience with IT Security; Experience in a publicly held IT organization preferred
- **Requirement to speak, read AND write in English with a minimum of 85% proficiency
**Knowledge & Skills**:
- **Special Skills**:
- Able to use assessment tools and other security tools found in large network environments; along with the ability to work with Security Information and Event Management (SIEM) solutions.
- Must be able to work on-site
- Able to communicate security events, potential impacts, and actions taken to higher-tier resolvers and management team
- Very organized and detail oriented
- Outside of the box learning mindset
- **Specialized Knowledge**:
- CISSP or similar security certification recommended - In addition, CISSP-ISSEP, CISA, CRISC, and ITIL ITSM Foundation is desirable
- Working knowledge of the MITRE Attack framework
- Working knowledge security framework models such as ISO 27000 series, NIST CSF, COBIT, etc
- **Other**:
- Displays the highest standard of integrity (demonstrated by an unblemished career history, complete lack of criminal convictions etc.), and willing to undergo vetting and/or personality assessments to verify, if necessary.
**U.S. Applicants: EOE/AA Disability/Veteran
-
Tijuana - Information Security Threat Hunter
hace 4 semanas
Tijuana, México Integer A tiempo completoBy living according to a common set of values, we create a culture that unifies, embraces the uniqueness we all bring to the company, and positions Integer for long-term success.At Integer, our values are embedded in everything we do.CustomerWe focus on our customers’ successInnovationWe create better solutionsCollaborationWe create success...
-
Tijuana - Senior Information Security Analyst
hace 4 semanas
Tijuana, México Integer A tiempo completoBy living according to a common set of values, we create a culture that unifies, embraces the uniqueness we all bring to the company, and positions Integer for long-term success.At Integer, our values are embedded in everything we do.**Customer**We focus on our customers’ success**Innovation**We create better solutions**Collaboration**We create success...
-
Tijuana - Senior Information Security Analyst
hace 3 semanas
Tijuana, México Integer A tiempo completoBy living according to a common set of values, we create a culture that unifies, embraces the uniqueness we all bring to the company, and positions Integer for long-term success.At Integer, our values are embedded in everything we do.**Customer**We focus on our customers' success**Innovation**We create better solutions**Collaboration**We create success...
-
Head Of Security Operations
hace 2 semanas
Tijuana, México findojobs A tiempo completoOverview The integral leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure...
-
Head Of Security Operations
hace 2 semanas
Tijuana, México findojobs A tiempo completoOverview The integral leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure...
-
Head Of Security Operations
hace 2 semanas
Tijuana, México findojobs A tiempo completoOverview The integral leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices that determine how Canonical secures its data, internal infrastructure...
-
Information Security Engineer
hace 1 semana
Tijuana, México Integer Holdings Corporation A tiempo completoBy living according to a common set of values, we create a culture that unifies, embraces the uniqueness we all bring to the company, and positions Integer for long-term success. At Integer, our values are embedded in everything we do. **Customer** We focus on our customers’ success **Innovation** We create better solutions **Collaboration** We...
-
Cyber Security Analyst
hace 2 semanas
Tijuana, México Insulet Corporation A tiempo completoInsulet started in 2000 with an idea and a mission to enable our customers to enjoy simplicity, freedom and healthier lives through the use of our Omnipod® product platform. In the last two decades we have improved the lives of hundreds of thousands of patients by using innovative technology that is wearable, waterproof, and lifestyle accommodating.We are...
-
Threat Intelligence Lead
hace 2 semanas
Tijuana, México Canonical A tiempo completoThe Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well...
-
Threat Intelligence Lead
hace 2 semanas
Tijuana, México Canonical A tiempo completoThe Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well...