1+ months

Global Security Organization CIRC Cybersecurity Analyst - 183008

Manila, CO 80102
  • Job Code
\u003Cp\u003E\u003Cstrong\u003EAt ADP we are driven by your success\u003C/strong\u003E. We engage your unique talents and perspectives. We welcome your ideas on how to do things differently and better. In your efforts to achieve, learn and grow, we support you all the way. If success motivates you, you belong at ADP.\u003C/p\u003E \u003Cp\u003E\u003Cstrong\u003ETechnology at ADP. \u003C/strong\u003EIt\u0027s the foundation of the products and services that have made us a world-wide leader in workforce solutions. With us, you can combine technical skills and business acumen, to effectively consult as well as solve technical challenges. You have the opportunity to train on leading-edge technologies that continually redefine what\u0027s possible in our industry. \u003C/p\u003E \u003Cp\u003E\u0026nbsp;\u003C/p\u003E \u003Cp\u003EThe \u003Cstrong\u003EGSO Critical Incident Response Center Converged Analyst\u003C/strong\u003E within ADP\u0027s Global Security Organization (GSO) is responsible for monitoring multiple sources of analytical computer and physical security related information. The CIRC\u0027s main focus is to take this disparate information, and turn it into strategic and tactical intelligence that is relevant to protecting ADP\u0027s lines of business. The output of this analysis will be used to ensure a consistent and coordinated response to ongoing security threats ensuring ADP can continue to operate safely and securely.\u003C/p\u003E \u003Cp\u003E\u0026nbsp;\u003C/p\u003E \u003Cp\u003EThe Converged Analyst, who will be part of CIRC-PH\u0027s team, must have a holistic understanding of the modern physical, efraud, and cyber security landscape with a strong background in incident response and process documentation. They will handle high complexity security threats generated by ADP\u0027s automated detection systems, 3rd party and internal intelligence, and manual identification by ADP associates and clients. The successful candidate will also perform the first level triage of all automated alerts for suspicious transactions identified inside of ADP\u0027s money movement platforms. The Converged Analyst will process cyber alerts towards the resolution of critical incidents/events through standard applications and processes. The analyst must have the requisite knowledge to document procedures and ensure appropriate reporting, acquire full understanding of alerts, and, if needed, escalate to ADP\u0027s CIRC leads/managers for appropriate action. This role will be responsible for following detailed procedures for addressing high-risk activity and will be based on a follow-the-sun (FTS), 24x7 model.\u003C/p\u003E \u003Cp\u003E\u0026nbsp;\u003C/p\u003E \u003Cul\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Monitoring of the cyber and fraud alert queue; triage of incidents to determine if escalation is required. \u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Qualify and identify Cyber/Fraud Alert Impact/Validity by engaging the Line of Business Contact or other parts of ADP client operations\u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Following documented technical and management escalation processes to escalate up to the CIRC-US leads and CSS\u0027 Fraud Investigators as quickly as possible.\u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Communicates critical cyber or fraud alerts progress status though the use of standard tool. \u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Help develop, document, and formalize a standardized global incident response processes across ADP organization.\u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Help determine key stakeholders and gather current best practices from the same \u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Help define, build, test, and implement correlation rules that support the monitoring and enforcement of the ADP security policies.\u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Produce metrics that support GSO\u0027s strategic direction.\u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Determine critical support requirements needed to ensure ADP stakeholders are fully supported.\u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Conduct technical analysis and assessments of security related incidents, including malware analysis, packet level analysis, and system level forensic analysis.\u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Develop and maintain a liaison relationship with other CIRC teams, other units with the GSO, and the Business, among others \u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Provide complete and detailed information to next shift during handoff. Ensure that next shift is fully equipped with information needed to handle the incident before disengaging. Introducing next shift team member to the technical support teams for proper hand over.\u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Be part of the team to generate weekly and monthly reports and provide analysis of incidents and identify areas of improvement.\u003C/li\u003E \u003Cli style=\u0022margin-top: 12.0pt;\u0022\u003E Perform other duties as assigned\u003C/li\u003E \u003C/ul\u003E \u003Cp style=\u0022margin-top: 12.0pt;\u0022\u003E\u003Cstrong\u003EREQUIREMENTS\u003C/strong\u003E\u003C/p\u003E \u003Cp style=\u0022margin-top: 12.0pt;\u0022\u003E\u0026nbsp;\u003C/p\u003E \u003Cul style=\u0022margin-top: 0.0in;\u0022\u003E \u003Cli\u003EBS degree in computer science/engineering/information technology or equivalent \u003C/li\u003E \u003C/ul\u003E \u003Cul style=\u0022margin-top: 0.0in;\u0022\u003E \u003Cli\u003EAny of the following are a plus: CFE, GISP, GSLC, GCFE, GCFA, GREM, GCIH CISSP, GSEC, or GCIA\u003C/li\u003E \u003C/ul\u003E \u003Cul\u003E \u003Cli style=\u0022\u0022\u003E Minimum of 3 years of IT/cyber security experience in a large global organization is required\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Experience in fraud auditing in a large global organization is a plus \u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Experience in security incident activities.\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Must be familiar with or willing to learn eFraud and the general concepts in facilitating money movement electronically\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Excellent analytical and documentation skills\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Familiarity with computer security forensics and security vulnerabilities\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Familiarity with multiple security technologies such as SIEM; Intrusion Detection Systems; End-point security; Web Proxy/Content Filtering; Active Directory, PKI, Radius, RSA SecureID, Log Analysis\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Enough SQL/PostgreSQL familiarity to generate queries \u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Functional experience with text and data representation and manipulation (XML, HTML, Regular Expressions, Wiki Markup, SQL)\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Conceptual knowledge of operating system internals (file handles, threads, semaphores, stack, heap, entry points)\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Knowledge of basic packing and obfuscation techniques\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E The candidate should have experience in Networking, Windows and *nix environments\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Understanding of TCP/IP and network communications\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E General knowledge of web content scripting languages.\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Knowledge of interpreting the log output of Windows and Unix logs\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Experience producing architectural diagrams and overviews for both business and technical audiences.\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Some exposure to collaborative workflow and documentation systems (Wiki documentation, project blogging)\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Familiarity with interpreting the log output of a wide selection of device classes, spanning Networking and host Infrastructure service devices\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Packet-level behavioral familiarity with most major TCP/IP application protocols\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Strong shell or other programming skills \u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Knowledge of how to operate a debugger (IDA Pro, OllyDbg)\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Enough SQL familiarity to generate nested queries and joins in a major SQL dialect\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Broad knowledge of data and executable file types and extracting information from them\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Functional knowledge of shellcode fundamentals\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Knowledge of business-impacting security scenarios and viable methods to detect these scenarios (Cross device log correlation). \u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Implementation experience with some of the major centralized authentication systems (LDAP, KERBEROS, NIS, RADIUS)\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E Implementation experience with general enterprise core service types (web/mail/dns/file servers) and core infrastructure elements (general switch/router/proxy/firewall configurations)\u003C/li\u003E \u003Cli style=\u0022\u0022\u003E General understanding of key components of international internet architecture. Infrastructure and Authentication Systems \u003C/li\u003E \u003C/ul\u003E \u003Cul style=\u0022margin-top: 0.0in;\u0022\u003E \u003Cli\u003EGood teamwork, communication/information sharing, strong analytical skills and influencing skills\u003C/li\u003E \u003Cli\u003EExcellent verbal and written communication skills, exceptional interpersonal skills are required\u003C/li\u003E \u003Cli\u003ESense of urgency required while maintaining a high degree of professionalism.\u003C/li\u003E \u003Cli\u003EThe ability to multi-task, work with minimal supervision, and achieve results in a fast-paced environment.\u003C/li\u003E \u003C/ul\u003E \u003Cp style=\u0022\u0022\u003E\u0026nbsp;\u003C/p\u003E \u003Cp\u003E\u0026nbsp;\u003C/p\u003E \u003Cp\u003E\u003Cstrong\u003ECOMPETENCIES\u003C/strong\u003E\u003C/p\u003E \u003Cul\u003E \u003Cli\u003EActing in ways that helps deliver results in a diverse and changing environment. \u003C/li\u003E \u003Cli\u003ESharing ideas and information across diverse audiences and identities to drive our business. \u003C/li\u003E \u003Cli\u003ESolving day-to-day problems in a way that keeps the overall benefit to ADP in mind. \u003C/li\u003E \u003Cli\u003EDelivering world-class service and satisfaction to all clients - internal, external, diverse and emerging. \u003C/li\u003E \u003Cli\u003ETaking ownership of one\u0027s own professional growth and development to better contribute to ADP\u0027s goals. \u003C/li\u003E \u003Cli\u003EWorking effectively with others throughout ADP to achieve shared goals and unmatched results. \u003C/li\u003E \u003Cli\u003EMaintaining focus to deliver results in a fast-pace and diverse environment. \u003C/li\u003E \u003Cli\u003EHolding self and others to the highest personal and professional standards, becoming a role model for ADP\u0027s vision and values. \u003C/li\u003E \u003Cli\u003EUphold highest level of confidentiality. \u003C/li\u003E \u003Cli\u003EDemonstrating attention to detail, sense of urgency, and self-motivated discipline.\u003C/li\u003E \u003C/ul\u003E \u003Cp\u003E\u0026nbsp;\u003C/p\u003E \u003Cp\u003E\u003Cstrong\u003E\u003Cu\u003EAbout ADP\u003C/u\u003E\u003C/strong\u003E\u003Cstrong\u003E: We power organizations with insightful solutions that drive business success\u003C/strong\u003E. Consistently named one of the \u0026quot;Most Admired Companies\u0026quot; by \u003Cem\u003EFORTUNE\u003C/em\u003E\u0026reg; Magazine, and recognized by \u003Cem\u003EForbes\u003C/em\u003E\u0026reg; as one of \u0026quot;The World\u0027s Most Innovative Companies,\u0026quot; ADP has over a half-million clients around the globe and 60\u002B years of experience as a world-wide leader of business outsourcing solutions. \u003C/p\u003E \u003Cp style=\u0022text-align: center;\u0022\u003E\u003Cstrong\u003E\u003Cem\u003EADP is an Equal Opportunity Employer. ADP believes that diversity leads to strength.\u003C/em\u003E\u003C/strong\u003E\u003C/p\u003E \u003Cp\u003E\u0026nbsp;\u003C/p\u003E \u003CP\u003E\u003C/P\u003E \u003CP\u003EWe\u0027re designing a better way to work, so you can achieve what you\u0027re working for. Consistently named one of the \u0027Most Admired Companies\u0027 by FORTUNE\u00AE Magazine, and recognized by DiversityInc\u00AE as one of the \u0027Top 50 Companies for Diversity,\u0027 ADP works with more than 740,000 organizations across the globe to help their people work smarter, embrace new challenges, and unleash their talent. \u0022Always Designing for People\u0022 means we\u0027re creating platforms that will transform how great work gets done, so together we can unlock a world of opportunity.\u003C/P\u003E \u003CP\u003EAt ADP, we believe that diversity fuels innovation. ADP is committed to equal employment opportunities regardless of race, color, genetic information, creed, religion, sex, sexual orientation, gender identity, lawful alien status, national origin, age, marital status, or protected veteran status. We support an inclusive workplace where associates excel based on personal merit, qualifications, experience, ability, and job performance.\u003C/P\u003E


Posted: 2019-09-16 Expires: 2019-12-13

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Global Security Organization CIRC Cybersecurity Analyst - 183008

Manila, CO 80102

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast