Security Monitoring Analyst - Houston, TX Law Enforcement & Security - Houston, TX at Geebo

Security Monitoring Analyst - Houston, TX

As businesses leverage digitalization opportunities, their cyber-attack surface structurally increases, which can lead to business disruptions, data breaches and brand damage. High profile industry incidents show that these risks are real, and this has turned cyber resilience into a topic for Boards.
As part of the Information Risk Management (IRM) function in Shell, the Cyberdefence capability has specific focus on identifying cyber threats, discovery of IT vulnerabilities, monitoring for cyber intrusions and response to security incidents.. Shell Cyberdefence is responsible for defending Shell against advanced Cyber attacks through monitoring for advanced Cyber threats, discovery of vulnerabilities and investigating global Cyber incidents. This organization is part of Information Risk Management (IRM) function in Shell IT Services and Operations.
The Monitoring Analyst supports Cyberdefence by performing incident response and investigations into Cyber security incidents.
As part of the Cyberdefence capability the global Monitoring team has the following main area of focus:
To monitor real-time for cyber intrusions based on indicators of compromise or anomalies from normal behaviour and raise security incidents where necessary.
The Cyberdefence Monitoring Analyst is responsible for detecting and reporting on potential Information Security events of interest in the IT infrastructure and the use of IT services through the selection, deployment, and improvement of monitoring tools, the incident management processes which support all security, BID and code of conduct incidents involving IT infrastructure and the rapid and effective resolution of incidents involving ITSO and IT suppliers.
Real-time Monitoring
Ensure continuous monitoring of the Shell IT landscape for cyber breaches, performing triage and analysis of events.
Ensure a proper balance between raising suspicious behaviours and raising too many false positives.
Together with the Incident Lead and Threat and Analytics Lead create a feedback loop to enhance the monitoring technology.
Ensure proper handover takes place between Asia-Pac, Europe and US regions to create a near 24/7 coverage of monitoring.
Deliver and Monitoring Services
Efficiently and effectively monitor the Shell IT estate for Information Security breaches (using Splunk, FireEye, RSA, etc)
Support the implementation of new infrastructure monitoring tools, both retained and outsourced
Proactively monitor and support performance improvement of all retained and outsourced monitoring tools (IDS, desktop monitoring agents, Netflow, DLP, Proxy, etc).
Perform data harvesting in support of investigations performed by Business Integrity, IRM, Legal and HR.
Report vulnerabilities to businesses and suppliers and drive short term remediation.
Analyse monitoring data to detect threats and vulnerabilities and recommend structural improvements.
Operating the Shell Incident Management and Monitoring Process
Operate part of the IRM incident processes, and support improvement activities
Provide triage, data acquisition, analysis and advice on all incidents to help rapidly diagnose problems and identify immediate treatment.
Handle data harvesting request and ensure suppliers follow the agreed process.
Maintain an up-to-date register of data sources, harvesting methods, accountabilities and timescales.
Support the deployment of tools to support security monitoring, harvesting and analysis.
. Apply now!Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.