Security Analyst Type: Full-time Location: Florence, SC Status: published

description

Meta is seeking a Security Analyst to join our Internal Detection and Response team. This Analyst will serve on the front lines of Meta’s networks and support a critical support function in ensuring the security of personnel and assets throughout our various offices/networks across the world. The Analyst will be leveraging an armory of tools, systems, and databases that provide advanced... correlation and analysis capabilities to identify both internal and external cybersecurity threats in our environment. Utilizing Meta’ advanced internal tooling, and massive scale data processing, this position will monitor worldwide events in real-time, assess potential threats, and provide accurate and timely notifications of these threats to the appropriate persons. The Analyst will triage alerts as they come in and utilize critical thinking to respond appropriately to these incidents. This candidate must have a drive for security, value the protection of user data, and want to learn and grow. You will collaborate closely with highly technical teams, with a diverse set of skills to tackle the panoply of challenges that we encounter at Meta scale. This is truly a unique opportunity to help defend the almost 3 billion Meta users and our global infrastructure against threats and abuse. Care to join the fight?

Security Analyst Responsibilities:

Perform initial triage & fact identification: for every Security Incident, initial triage occurs to understand what has happened in order to assess the scope of impact. As part of triage, evidence and facts are uncovered.

Investigate and respond to external and internal cybersecurity threats in a timely manner while communicating clearly and proactively until remediated.

Collaborate with cross-functional teams to drive improvements to policies and processes across teams.

Contribute to assignments to improve processes, capabilities, and overall security operations. Identify and recommend improvements in detection, response, communications, and remediation to reduce complexity and improve efficiency and effectiveness of the team.

Diligent and up-to-date documentation/reporting throughout the triage and incident response process: Review and understand what happened to ensure that the root cause and contributing factors are identified and documented.

Understand the security needs of internal and external stakeholders, regulators, and auditors.

Perform other tasks and duties of a similar nature and scope as assigned.

Minimum Qualifications:

1+ years of professional experience in a Security Operations Center or in a relevant investigative capacity

1+ years of experience navigating and understanding Windows, Linux and Mac Operating Systems and OS internals

Understanding and usage of tools available for investigations: EDR, SIEM/SOAR, UBA

Experience protecting security and privacy on the internet

Experience making important decisions independently and multi-tasking under pressure

Experience responding quickly to changing situations in complex environments without compromising quality

Preferred Qualifications:

Experience querying data with SQL

Experience with User Behavior Analytics (UBA) tooling

Experience investigating Insider Threats

Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, reproductive health decisions, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, genetic information, political views or activity, or other applicable legally protected characteristics. You may view our Equal Employment Opportunity notice here. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. We may use your information to maintain the safety and security of Meta, its employees, and others as required or permitted by law. You may view Meta's Pay Transparency Policy, Equal Employment Opportunity is the Law notice, and Notice to Applicants for Employment and Employees by clicking on their corresponding links. Additionally, Meta participates in the E-Verify program in certain locations, as required by law

benefits

Estimated Salary: $20 to $28 per hour based on qualifications

responsibilities

This Analyst will serve on the front lines of Meta’s networks and support a critical support function in ensuring the security of personnel and assets throughout our various offices/networks across the world
The Analyst will be leveraging an armory of tools, systems, and databases that provide advanced correlation and analysis capabilities to identify both internal and external cybersecurity threats in our environment
Utilizing Meta’ advanced internal tooling, and massive scale data processing, this position will monitor worldwide events in real-time, assess potential threats, and provide accurate and timely notifications of these threats to the appropriate persons
The Analyst will triage alerts as they come in and utilize critical thinking to respond appropriately to these incidents
Perform initial triage & fact identification: for every Security Incident, initial triage occurs to understand what has happened in order to assess the scope of impact
As part of triage, evidence and facts are uncovered
Investigate and respond to external and internal cybersecurity threats in a timely manner while communicating clearly and proactively until remediated
Collaborate with cross-functional teams to drive improvements to policies and processes across teams
Contribute to assignments to improve processes, capabilities, and overall security operations
Identify and recommend improvements in detection, response, communications, and remediation to reduce complexity and improve efficiency and effectiveness of the team
Diligent and up-to-date documentation/reporting throughout the triage and incident response process: Review and understand what happened to ensure that the root cause and contributing factors are identified and documented
Understand the security needs of internal and external stakeholders, regulators, and auditors
Perform other tasks and duties of a similar nature and scope as assigned

qualifications

This candidate must have a drive for security, value the protection of user data, and want to learn and grow
1+ years of professional experience in a Security Operations Center or in a relevant investigative capacity
1+ years of experience navigating and understanding Windows, Linux and Mac Operating Systems and OS internals
Understanding and usage of tools available for investigations: EDR, SIEM/SOAR, UBA
Experience protecting security and privacy on the internet
Experience making important decisions independently and multi-tasking under pressure
Experience responding quickly to changing situations in complex environments without compromising quality
Cookies & PrivacyWe do care about your privacy. we use cookies to give you the best experience of our website and our platform. By browsing and using our services on your browser, mobile app and any service is related to us you agree to our use of cookies. Accept itMore information