The Home Depot San Jose, CA Remote
2021-11-30

Threat Detection Response Cybersecurity Analyst -STAFF SYSTEMS ENGINEER (REMOTE)

3.7
POSITION PURPOSE:
The Home Depot is able to offer virtual employment of this position in the following states: AL, AK, AZ, AR, DE, DC, FL, GA, HI, ID, IL, IN, IA, KS, KY, LA, ME, MD, MA, MI, MN, MS, MO, MT, NE, NH, NJ, NM, NY, NC, ND, OH, OK, OR, PA, RI, SC, SD, TN, TX, UT, VT, VA, WA, WV, WI, WA.


The Staff Systems Engineer is responsible for leading a team of engineers designing, building, and supporting The Home Depot's technical infrastructure of hardware and system software that drives the success of Home Depot and our customers. As a Staff Systems Engineer you will be part of a dynamic team with engineers of all experience levels who help each other build and grow technical and leadership skills while creating, deploying, and supporting production infrastructure. Staff Systems Engineers contribute to foundational infrastructure as code elements that can be reused as well as architectural diagrams and other related documentation. Staff Systems Engineers participates in the selection and lead the implementation of physical and virtual infrastructure to meet evolving enterprise and product team needs. As a Staff Systems Engineer, you will be a core player that participates and leads multiple efforts simultaneously. You are expected to build and grow the skillsets of more junior Engineers on the team.

General Description:

Under limited supervision the TDR (Threat Detection & Response) Staff Analyst will report to the TDR Manager. The TDR Staff Analyst will perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoint. The TDR Staff Analyst should have strong familiarity with the principles of network and endpoint security, current threat and attack trends, an understanding of the OSI model, and have a working knowledge of defense in depth strategies.

Functional Skills: Minimum Requirements:

  • Action Oriented: Taking on new opportunities and tough challenges with a sense of urgency, high energy and enthusiasm
  • Collaborates: Building partnerships and working collaboratively with others to meet shared objectives
  • Customer Focus: Building strong customer relationships and delivering customer-centric solutions
  • Drives Results: Consistently achieving results, even under tough circumstances
  • Communicates Effectively: Developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences

Knowledge, Skills, Abilities, and Competencies:

  • Ability to provide analysis reports in numerous formats based upon cyber threat research
  • Ability to effectively ascertain and leverage trustworthy open and closed-source cyber threat intelligence data feeds
  • Ability to identify emerging and persistent threats to the organization's networks, systems, and applications
  • Ability to independently research and comprehensively analyze actionable cyber threat observables pertinent to the organization.
  • Ability to identify potential security exposures that may currently exist or may pose a potential future threat to applications
  • Ability to identify, monitor, assess, and counter the threat posed by cyber actors
  • Ability to perform advanced threat hunt operations using known adversary tactics, techniques and procedures as well as indicators of attack in order to detect adversaries with persistent access to the enterprise
  • Ability to assess cyber threat actor intent and future activities
  • Ability to develop reports using data hosted in multiple sources (e.g. spreadsheets, databases) and communicate clearly to management and other team members
  • Ability to collect information about Internet-based malware-related criminal activities and the people behind them
  • Malware RE and rule development as well as understanding of sandbox and static (malware) analysis output
  • Make predictions about cyber criminals and their future activities based on what is already known about them
  • Verify discovered vulnerabilities; correlate and collate the information; and create intelligence reports that communicate the results of the analyses to people * who need to know them (e.g., C-Suite, executives, government decision-makers, security officials)

Key Responsibilities:

  • Respond to network and host based advanced security events
  • Lead network and host-based security investigations
  • Analyze common application protocols to detect anomalous/reconstruct malicious activity
  • Analyze various Operating System logs to detect anomalous/reconstruct malicious activity
  • Investigate, correlate, and assess the impact of hits on indicators of compromise (IOCs)
  • Develop innovative ways to detect threats and anomalous behavior leveraging host, network, and data logs
  • Ability to participate in detecting, investigating, and resolving security events
  • Capable of working independently
  • Lead detecting, investigating, and resolving security events
  • Conduct detailed security event analysis from network traffic attributes and host-based attributes (memory analysis, binary analysis, etc.) to identify information security incidents
  • Identify and propose areas for improvement within the Threat Detection & Response Center
  • Good communication skills

Skill and Attributes for Success:

  • Extensive experience working with SIEM, Log Aggregators, Incident Response Management solutions
  • Strong technical knowledge of Networking, Operating Systems and enterprise integrations
  • Experience managing standards, developing Security Operations Process, reporting and dashboards
  • Excellent communication, collaboration, relationship management and leadership
  • Self-directed and able to perform tasks without supervision
  • Information Security Principles, Technologies, and Practices
  • Proven experience with multiple security event detection platforms
  • Thorough understanding of TCP/IP
  • Understand IDS / IPS rules to identify and/or prevent malicious activity
  • Demonstrated integrity in a professional environment
  • Good social, communication and technical writing skills
  • Thorough understanding of application protocols
  • Ability to code in one or more major programming or scripting language
  • Ability to multi-task and prioritize work effectively,
  • Highly motivated Self-Starter, attention to detail, strong sense of ownership and driven to manage tasks to completion


Major Tasks, Responsibilities & Key Accountabilities:

25% Delivery and Execution - Leads configuration, debugging, and support for information technology solutions; Leads field and corporate rollouts of technology; Leads the stand up of necessary system software, hardware, and equipment (physical or virtual) to meet changing infrastructure needs; Creates and optimizes specifications for technology solutions; Produces and manages purchase requests for hardware and software; Leads development of test suites (functional, destructive, etc) to enable successful rapid deployment of infrastructure as code to production


15% Learning - Keeps abreast of innovations and industry trends as well as changes to internal systems and determines how they impacts tools, training, and support necessary to keep systems up, running, and secure; Participates in and contributes to learning activities around modern systems engineering core practices (communities of practice); Proactively views articles, tutorials, and videos to learn about new technologies and best practices being used within other technology organizations


30% Planning and Analysis - Researches and analyzes business trends and behavioral data to identify strategic opportunities for improvements and new initiatives; Leads the evaluation, development, and recommendation of specific strategic technology to provide cost-effective solutions that meet THD requirements; Researches and designs best fit infrastructure, network, database, cloud, AI, and security architectures for products; Proactively creates and maintains infrastructure as code and AI models for continuous improvement; Participates in strategic project planning and management across multiple efforts; Develops formal training courses


30% Support and Enablement - Collaborates with product and project teams to understand needs and enable them with infrastructure; Supports technology architecture design review efforts for project and product teams; Leverages tooling and custom applications to monitor the operational status of applications, infrastructure, networks, databases, and security; optimizes and tunes performance as appropriate; Drives root cause analysis, debugging, support, and post-mortem analysis for security incidents and service interruptions; Maintains, upgrades, and supports existing systems and infrastructure to ensure operational stability; Acts as a vendor liaison, owning resourcing, issue management, and documentation; Leads the production of in-house documentation around solutions; Provides application support for software running in production; Acts as a mentor to more junior Systems Engineers; Drives converting KB articles into AI models; Drives changes to analytic models used to analyze performance

Nature and Scope:
This position typically reports to Systems Engineer Manager or Sr Manager


This position typically has 0 Direct Reports

Environmental Job Requirements:
Located in a comfo...
Standard Minimum Qualifications:
Must be eighteen years of age or older.
Must be legally permitted to work in the United States.


Certifications:

  • GSEC
  • GCIA
  • Linux+
  • Security+
  • Network+
  • CEH
  • CCNA CyberOps
  • GCIH
  • GCFE

Preferred Certifications:

  • GCED
  • GCUX
  • GMON
  • GREM
  • C|HFI
  • GREM
  • GCFA
  • GNFA
  • CISSP
  • OSCP


Education Required:
The knowledge, skills and abilities typically acquired through the completion of a bachelor's degree program or equivalent degree in a field of study related to the job.

Years of Relevant Work Experience:
4 years

Physical Requirements:
Most of the time is spent sitting in a comfortable position and there is frequent opportunity to move about. On rare occasions there may be a need to move or lift light articles.

Preferred Qualifications:
  • 3-6 years of relevant work experience
  • Professional or educational experience in multiple Information Technology disciplines
  • Proficiency in working as part of a collaborative, cross-functional, modern engineering team
  • Proficiency in troubleshooting and remediation within multiple Information technology disciplines
  • Proficiency with debuggers, runtime analysis, library systems, compiled programming, and software update tools
  • Proficiency in system and environment analysis, design, and optimization
  • Exposure to developing technical roadmaps including work estimation, refactoring, and modernizing legacy systems
  • Experience with object oriented programming languages (preferably Java), distributed computing environments, and code reviews
  • Experience with system security design and management
  • Experience with disaster recovery planning and engineering
  • Proficiency in operating system commands and utilities as well as scripting
  • Proficiency working with cloud platforms such as GCP and Azure
  • Proficiency in supporting a 24x7 retail operation
  • Proficiency with version control systems
  • Proficiency with CI/CD toolchain
  • Proficiency with production system designs including Infrastructure as Code, High Availability, and Performance monitoring
  • Experience with Site Reliability Engineering (SRE)

Knowledge, Skills, Abilities and Competencies:
  • Action Oriented
  • Being Resilient
  • Business Insights
  • Global Perspective
  • Manages Ambiguity
  • Nimble Learning
  • Self-Development
  • Collaborates
  • Cultivates Innovation
  • Optimizes Work Processes
  • Situational Adaptability
  • Communicates Effectively
  • Drives Results
  • Interpersonal Savvy



Pay Rate: -