« Ga terug   Print

Cybersecurity Monitoring Analyst

Shell | Rijswijk | HBO | Fulltime | Sluit 2017-09-30

As part of the Information Risk Management function, the Cyberdefence capability has specific focus on identifying cyber threats, discovery of IT vulnerabilities, monitoring for cyber incidents.

Cybersecurity Monitoring Analyst

Country of Work Location
Netherlands

Work Location
Rijswijk - Kessler Park

Company Description
Shell Nederland BV is a platform for international collaboration, with Shell offering direct employment to around ten thousand people in the Netherlands alone, including roughly 2,800 non-Dutch employees from around 80 countries. Diversity is key at Shell Nederland, and our employees reflect the innovation that stems from a diverse workforce. By joining Shell Nederland, you will benefit from an unrivalled industry-leading development programme that will see you tap into a pool of expert knowledge that will help propel your career. Shell Nederland is the holding company of most Shell companies operating in the Netherlands. Shell Nederland also has an advisory and coordinating role in numerous areas.

Job Description
As businesses leverage digitalization opportunities, their cyber-attack surface structurally increases, which can lead to business disruptions, data breaches and brand damage. High profile industry incidents show that these risks are real, and this has turned cyber resilience into a topic for Boards.”
 


As part of the Information Risk Management (IRM) function in Shell, the Cyberdefence capability has specific focus on identifying cyber threats, discovery of IT vulnerabilities, monitoring for cyber intrusions and response to security incidents.". Shell Cyberdefence is responsible for defending Shell against advanced Cyber attacks through monitoring for advanced Cyber threats, discovery of vulnerabilities and investigating global Cyber incidents. This organization is part of Information Risk Management (IRM) function in Shell IT Services and Operations.
 
The Monitoring Analyst supports Cyberdefence by performing incident response and investigations into Cyber security incidents.

Job responsibilities
As part of the Cyberdefence capability the global Monitoring team´s focus is to monitor real-time for cyber intrusions based on indicators of compromise or anomalies from normal behaviour and raise security incidents where necessary.
 
The Cyberdefence Monitoring Analyst is responsible for detecting and reporting on potential Information Security events of interest in the IT infrastructure and the use of IT services through the selection, deployment, and improvement of monitoring tools, the incident management processes which support all security, BID and code of conduct incidents involving IT infrastructure and the rapid and effective resolution of incidents involving ITSO and IT suppliers.
 


Real-time Monitoring

  • Ensure continuous monitoring of the Shell IT landscape for cyber breaches, performing triage and analysis of events.
  • Ensure a proper balance between raising suspicious behaviours and raising too many false positives.
  • Together with the Incident Lead and Threat and Analytics Lead create a feedback loop to enhance the monitoring technology.
  • Ensure proper handover takes place between Asia-Pac, Europe and US regions to create a near 24/7 coverage of monitoring.

Deliver and Monitoring Services

  • Efficiently and effectively monitor the Shell IT estate for Information Security breaches (using Splunk, FireEye, RSA, etc)
  • Support the implementation of new infrastructure monitoring tools, both retained and outsourced
  • Proactively monitor and support performance improvement of all retained and outsourced monitoring tools (IDS, desktop monitoring agents, Netflow, DLP, Proxy, etc).
  • Perform data harvesting in support of investigations performed by Business Integrity, IRM, Legal and HR.
  • Report vulnerabilities to businesses and suppliers and drive short term remediation.
  • Analyse monitoring data to detect threats and vulnerabilities and recommend structural improvements.

Operating the Shell Incident Management and Monitoring Process

  • Operate part of the IRM incident processes, and support improvement activities
  • Provide triage, data acquisition, analysis and advice on all incidents to help rapidly diagnose problems and identify immediate treatment.
  • Handle data harvesting request and ensure suppliers follow the agreed process.
  • Maintain an up-to-date register of data sources, harvesting methods, accountabilities and timescales.
  • Support the deployment of tools to support security monitoring, harvesting and analysis.

Requirements

  • High School Diploma; Bachelor’s degree preferred
  • Minimum 3+ years in Information Security or related IT roles.
  • Demonstrable experience performing incident response and IT forensic investigations.
  • Strong analytical ability and attention to detail coupled with a broad understanding of all stages of Information Risk Management framework development.
  • Understanding of monitoring tools such ArcSight, Splunk (ES), Network monitoring tools, IDS systems and Incident Response tools.
  • Demonstrating high standards of professional behaviour in dealings with business customers, colleagues, suppliers and staff.
  • Systematic, disciplined and analytical approach to problem solving with demonstrable verbal and written communications skills.
  • Ability to plan, schedule and monitor work, within set targets, for several dedicated teams.
  • Moderate event analysis leveraging SIEM tools (Splunk/ArcSight)
  • Moderate knowledge or IDS/IPS systems
  • Moderate knowledge of Windows and Unix or Linux
  • Moderate knowledge of Firewall and Proxy technology
  • Basic to Moderate incident investigation and response skill set
Basic to Moderate log parsing and analysis skill set
Moderate knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc)
  • Basic to Moderate knowledge of malware operation and indicators, of current threat landscape (threat actors, APT, cyber-crime, etc)
Basic knowledge of Data Loss Prevention monitoring
Basic experience with scripting
Basic knowledge of forensic techniques
Basic to Moderate protocol analysis experience (Wireshark, RSA Netwitness, etc.)
Basic knowledge of audit requirements (PCI, HIPPA, SOX, etc.)
  • 
Relevant certifications such as, CISSP, SANS and preferably:
  • GCIH: GIAC Certified Incident Handler
  • GCIA: GIAC Certified Intrusion Analyst
  • GCFA: GIAC Certified Forensic Analyst
  • GREM: GIAC Reverse Engineering Malware
  • Offensive Security Certified Professional – OSCP Certification
  • Offensive Security Wireless Professional – OSWP Certification
  • Offensive Security Certified Expert – OSCE Certification
  • Offensive Security Exploitation Expert – OSEE Certification
  • Offensive Security Web Expert – OSWE Certification

No. of Positions
3

Disclaimer
Please note: We occasionally amend or withdraw Shell jobs and reserve the right to do so at any time, including prior to the advertised closing date.

Before applying, you are advised to read our data protection policy. This policy describes the processing that may be associated with your personal data and informs you that your personal data may be transferred to Royal Dutch/Shell Group companies around the world.

The Shell Group and its approved recruitment consultants will never ask you for a fee to process or consider your application for a career with Shell. Anyone who demands such a fee is not an authorised Shell representative and you are strongly advised to refuse any such demand.

Shell is an Equal Opportunity Employer.

Interested?
Please apply online via the 'Apply' button.

Removal Date
26-Aug-2017

Agency calls not appreciated

Keywords: Job, Vacancy, Den Haag, Full-time, IT, Information Security, Monitoring analist.



Solliciteer op deze functie

Deel deze vacature