Security Analyst Type: Full-time
Location:
Florence, SC
Status:
published
description
Meta is seeking a Security Analyst to join our Internal Detection and Response team. This Analyst will serve on the front lines of Meta’s networks and support a critical support function in ensuring the security of personnel and assets throughout our various offices/networks across the world. The Analyst will be leveraging an armory of tools, systems, and databases that provide advanced... correlation and analysis capabilities to identify both internal and external cybersecurity threats in our environment. Utilizing Meta’ advanced internal tooling, and massive scale data processing, this position will monitor worldwide events in real-time, assess potential threats, and provide accurate and timely notifications of these threats to the appropriate persons. The Analyst will triage alerts as they come in and utilize critical thinking to respond appropriately to these incidents. This candidate must have a drive for security, value the protection of user data, and want to learn and grow. You will collaborate closely with highly technical teams, with a diverse set of skills to tackle the panoply of challenges that we encounter at Meta scale. This is truly a unique opportunity to help defend the almost 3 billion Meta users and our global infrastructure against threats and abuse. Care to join the fight?
Security Analyst Responsibilities:
Perform initial triage & fact identification: for every Security Incident, initial triage occurs to understand what has happened in order to assess the scope of impact. As part of triage, evidence and facts are uncovered.
Investigate and respond to external and internal cybersecurity threats in a timely manner while communicating clearly and proactively until remediated.
Collaborate with cross-functional teams to drive improvements to policies and processes across teams.
Contribute to assignments to improve processes, capabilities, and overall security operations. Identify and recommend improvements in detection, response, communications, and remediation to reduce complexity and improve efficiency and effectiveness of the team.
Diligent and up-to-date documentation/reporting throughout the triage and incident response process: Review and understand what happened to ensure that the root cause and contributing factors are identified and documented.
Understand the security needs of internal and external stakeholders, regulators, and auditors.
Perform other tasks and duties of a similar nature and scope as assigned.
Minimum Qualifications:
1+ years of professional experience in a Security Operations Center or in a relevant investigative capacity
1+ years of experience navigating and understanding Windows, Linux and Mac Operating Systems and OS internals
Understanding and usage of tools available for investigations: EDR, SIEM/SOAR, UBA
Experience protecting security and privacy on the internet
Experience making important decisions independently and multi-tasking under pressure
Experience responding quickly to changing situations in complex environments without compromising quality
Preferred Qualifications:
Experience querying data with SQL
Experience with User Behavior Analytics (UBA) tooling
Experience investigating Insider Threats
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, reproductive health decisions, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, genetic information, political views or activity, or other applicable legally protected characteristics. You may view our Equal Employment Opportunity notice here. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. We may use your information to maintain the safety and security of Meta, its employees, and others as required or permitted by law. You may view Meta's Pay Transparency Policy, Equal Employment Opportunity is the Law notice, and Notice to Applicants for Employment and Employees by clicking on their corresponding links. Additionally, Meta participates in the E-Verify program in certain locations, as required by law
benefits
Estimated Salary: $20 to $28 per hour based on qualifications
responsibilities
This Analyst will serve on the front lines of Meta’s networks and support a critical support function in ensuring the security of personnel and assets throughout our various offices/networks across the world The Analyst will be leveraging an armory of tools, systems, and databases that provide advanced correlation and analysis capabilities to identify both internal and external cybersecurity threats in our environment Utilizing Meta’ advanced internal tooling, and massive scale data processing, this position will monitor worldwide events in real-time, assess potential threats, and provide accurate and timely notifications of these threats to the appropriate persons The Analyst will triage alerts as they come in and utilize critical thinking to respond appropriately to these incidents Perform initial triage & fact identification: for every Security Incident, initial triage occurs to understand what has happened in order to assess the scope of impact As part of triage, evidence and facts are uncovered Investigate and respond to external and internal cybersecurity threats in a timely manner while communicating clearly and proactively until remediated Collaborate with cross-functional teams to drive improvements to policies and processes across teams Contribute to assignments to improve processes, capabilities, and overall security operations Identify and recommend improvements in detection, response, communications, and remediation to reduce complexity and improve efficiency and effectiveness of the team Diligent and up-to-date documentation/reporting throughout the triage and incident response process: Review and understand what happened to ensure that the root cause and contributing factors are identified and documented Understand the security needs of internal and external stakeholders, regulators, and auditors Perform other tasks and duties of a similar nature and scope as assigned
qualifications
This candidate must have a drive for security, value the protection of user data, and want to learn and grow 1+ years of professional experience in a Security Operations Center or in a relevant investigative capacity 1+ years of experience navigating and understanding Windows, Linux and Mac Operating Systems and OS internals Understanding and usage of tools available for investigations: EDR, SIEM/SOAR, UBA Experience protecting security and privacy on the internet Experience making important decisions independently and multi-tasking under pressure Experience responding quickly to changing situations in complex environments without compromising quality
Cookies & PrivacyWe do care about your privacy. we use cookies to give you the best experience of our website and our platform. By browsing and using our services on your browser, mobile app and any service is related to us you agree to our use of cookies.
Accept itMore information