Security Analyst at Ultimate Kronos Group (UKG)

Ultimate Kronos Group (UKG)

๐Ÿ“Œ United States of America
๐Ÿ•‘ January 22, 2021
๐Ÿท๏ธ Full Time
๐Ÿท๏ธ Security
View Application

You will be redirected to Ultimate Kronos Group (UKG)'s preferred application process.

SECURITY ANALYST

As a Security Analyst you will be part of the Security Operations Center team working with events and incidents as they come in. You will be monitoring infiltration attempts, analyzing logs, looking for patterns to ensure infiltration attempts are identified and dealt with in a timely manner. You will identify attack patterns and how to defend against them. You will be part of our global security operations center that follows a follow-the-sun structure, working to ensure continuous monitoring, detection and response to security events affecting Ultimate Software and our customers. You will work closely with our security operations centers in Fort Lauderdale, Singapore, and Paris.
Due to the nature of the work, you are required to have on-call duties on weekends. Additional work hours may also be required during an incident investigation.
Primary.
Essential Duties and Key

Responsibilities

Continuously monitor assets and respond to active threats to and within the enterprise Detect, report, assess, and respond to information security incidents.
Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system IDS logs) to identify possible threats to network security.
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
Read, interpret, write, modify, and execute simple scripts (e.g., Perl, VB
Script) on Windows and UNIX systems (e.g., those that perform tasks such as parsing large data files, automating manual tasks, and fetchingprocessing remote data). Monitor and analyze data flow to identify and block malicious behavior and activities Communicate in English write clearly and speak authoritatively to different audiences (business leaders and engineers) Provide 247 monitoring

Required Qualifications

Knowledge of operating systems.
Knowledge of OSI model and underlying network protocols (e.g., TCPIP). Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). Knowledge of the common networking and routing protocols (e.g.
TCPIP), services (e.g., web, mail, DNS), and how they interact to provide network communications. Knowledge of network traffic analysis methods Understand the applicability of software vulnerabilities Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute). Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
Strong analytical skills Ability to communicate and write in English professionally Experience, Education, Certification, License and Training Associate degree in computer science or a related discipline Fresh graduate or working professional with less than 3 years of relevant work experience

Preferred Qualifications

Knowledge of security event correlation tools.
Knowledge of the common attack vectors on the network layer. Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language.
Structured Query Language PLSQL and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). Skill in performing packet-level analysis.
Skill in using security event correlation tools.
Skill in reading and interpreting signatures (e.g., snort). Experience in open source development is a plus Experience working in a global organization is a plus Physical

Requirements

Work is primarily sedentary, although there may be some carrying of books, printouts, manuals, files, and equipment.
Travel

Requirements

15-25 This job description has been written to provide an accurate reflection of the current job and to include the general nature of work performed. It is not designed to contain a comprehensive detailed inventory of all duties, responsibilities, and qualifications required of the employees assigned to the job. Management reserves the right to revise the job or require that other or different tasks be performed when circumstances change.
Ultimate Software will reasonably accommodate employees with disabilities as defined by the Rehabilitation Act of 1973, the Americans with Disabilities Act (ADA) and other appropriate statutes. If you are an applicant and need a reasonable accommodation when applying for job opportunities within the Company or request a reasonable accommodation to utilize the Companyrsquos online employment application, please contact It has come to our attention that some people have been contacted online by persons impersonating job recruiters for Ultimate Software. These fraudulent ldquorecruitersrdquo have used Gmail accounts to contact, and have requested personal information, such as depositing a check to purchase work-related supplies. These are not legitimate recruiters or job offers, and do not represent Ultimate Software. To safely apply for and view open positions at Ultimate Software, please click ldquo.
Apply" and follow the instructions. Note that our recruiter emails always come from an official ukg.com email address.
If you suspect you have been the victim of this or a related fraud, immediately contact your financial institution, and then file a complaint with the FBIrsquos Internet Crime Complaint Center at www.ic3.gov. If you shared other personal or sensitive information, you may need to take additional actions relative to what was shared. Your local law enforcement department may also be able to assist. For any general security related questions regarding Ultimate, feel free to email

View Application

You will be redirected to Ultimate Kronos Group (UKG)'s preferred application process.


Job Expires: February 21, 2021

More Work-from-home Jobs

Leidos ๐Ÿ“Œ Ashburn, VA ๐Ÿ•‘ 2021-01-22 02:13:31

Developer, Junior Full-Stack

Apply

Leidos ๐Ÿ“Œ Jacksonville, NC ๐Ÿ•‘ 2021-01-22 02:13:31

Cyber Security Specialist

Apply

Leidos ๐Ÿ“Œ Lorton, VA ๐Ÿ•‘ 2021-01-22 02:13:31

Cross Domain Solutions Subject Matter Expert

Apply

Leidos ๐Ÿ“Œ Windsor Mill, MD ๐Ÿ•‘ 2021-01-22 02:13:31

& Linux Developer, SQL

Apply

Uh oh! Something went wrong. Please try again.
We were unable to find any more job. Have you tried changing your search keywords?

Work from the Safety of Your Own Home

You will be redirected to Ultimate Kronos Group (UKG)'s preferred application process.