empty

Cybersecurity Operations Analyst

Cummins Inc.

Job Description

Posted on: 
November 18, 2024

Summary and company overview

Job Summary:

Responsible for ensuring information and data on computer systems is protected and all networks and computer systems are adequately secure to prevent unauthorized access; investigates potential security breaches and recommends corrective actions to resolve and/or prevent reoccurrences; responsible for promoting IT security awareness

Company Overview:

[NA (Not provided in the description)]

Responsibilities

  • Assists with responding to computer security incidents according to the Information Security Policies and Industry Best Practices
  • Assists with coordinating the efforts of and provide timely updates to multiple business units during response
  • Contributes to a team of cyber security professionals working with threat data, writing non-complex reports, briefing event details to leadership, and coordinating remediation with personnel
  • Monitor information security related web sites (SANS Internet Storm Center, etc.) and mailing lists (BugTraq, etc.) to stay up to date on current attacks and trends
  • Perform basic analysis in support of Intrusion detection operations
  • Documents and escalates incidents, including event's history, status, and potential impact for further action, that may cause ongoing and immediate impact to the environment
  • Assists with incident triage, to include determining scope, urgency, and potential impact; identifying the specific vulnerability; and making recommendations that enable expeditious remediation
  • Provides timely detection, identification, and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities
  • Conducts research, analysis, and correlation across a wide variety of all source data sets (e.g., indications and warnings)
  • Recognizes a possible security violation or deficiencies and take appropriate action to report the incident, as required

Job Requirements

Required Qualifications:

  • College, university, or equivalent degree in Cybersecurity, Computer Science, or Information Technology, or related subject, or relevant equivalent experience required. This position may require licensing for compliance with export controls or sanctions regulations.

  • Minimal relevant work experience required

Preferred Qualifications:

  • NA (Not provided in the description)

Additional commentary

  • Competencies:
  • Action oriented - Taking on new opportunities and tough challenges with a sense of urgency, high energy, and enthusiasm.
  • Balances stakeholders - Anticipating and balancing the needs of multiple stakeholders.
  • Builds networks - Effectively building formal and informal relationship networks inside and outside the organization.
  • Communicates effectively - Developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences.
  • Manages conflict - Handling conflict situations effectively, with a minimum of noise.
  • Nimble learning - Actively learning through experimentation when tackling new problems, using both successes and failures as learning fodder.
  • Organizational savvy - Maneuvering comfortably through complex policy, process, and people-related organizational dynamics.
  • Cybersecurity Defense Operations - Performs operations according to the Cybersecurity Operations Plan to detect and mitigate potential or real-time internal and external threats.
  • Cybersecurity Incident Response - Investigates and analyzes relevant response activities using incident response plans to end malicious activity and restore Cummins business operations.
  • Cybersecurity Investigation - Captures and analyzes digital forensic evidence using forensic tools to identify the severity, exposure and threat of exploitation.
  • Cybersecurity Threat Analysis - Assesses internal and external cybersecurity attacks using cybersecurity standards and tools to identify specific vulnerabilities.
  • Values differences - Recognizing the value that different perspectives and cultures bring to an organization.

Summary and company overview

Job Summary:

Responsible for ensuring information and data on computer systems is protected and all networks and computer systems are adequately secure to prevent unauthorized access; investigates potential security breaches and recommends corrective actions to resolve and/or prevent reoccurrences; responsible for promoting IT security awareness

Company Overview:

[NA (Not provided in the description)]

Apply now