Description: North Americaneed a Security Operations Center Analyst immediately starts from Wed, 06 Feb 2013 20:55:04 GMT, this position will be placed in Ontario.
For more detail information about this job vacancy please read the description below. If interested in this position, please email us your resume, along with salary requirements and a cover letter to North America starts from Wed, 06 Feb 2013 20:55:04 GMT.
Research In Motion (RIM), a global leader in wireless innovation, revolutionized the mobile industry with the introduction of the BlackBerry® solution in 1999. Today, BlackBerry products and services are used by millions of customers around the world to the people and connect that matter most throughout their day. Founded in 1984 and based in Waterloo, Ontario, RIM operates offices in North America, Europe, Asia Pacific and Latin America. RIM is listed on the NASDAQ Stock Market (NASDAQ: RIMM) and the Toronto Stock Exchange (TSX: RIM). For more information, visit www.rim.com or www.blackberry.com.
Security Operations Center Analyst
Waterloo, Ontario, Canada
This team will be focused on configuring and maintaining security technologies and SOC-relevant tools (CISCO IDS; Snort IDS; ArcSight; Archer). It will be responsible for integrating new technologies into the SOC’s monitoring program, as well as building out associated operational processes (examples: NetWitness; AirTight; Iron Port; McAfee ePO (+DLP) and NAC).
This role will provide advanced technical assistance, project and task direction, analytic consultation and relationship management expertise.
This team must ensure that the SLAs defined by internal customer groups are attainable via the use of distributed security monitoring tools. The role acts as the liaison point for customers, SOC contact point for security process and technology projects and the escalation/ guidance point for analyst team members.
This role has responsibility for SOC participation in new security process and technology projects; describing and documenting operational procedures for existing and new security monitoring technologies, leading in the definition of response plans; conducting and participating in vendor relationships and guiding input from the customer.
Wed, 06 Feb 2013 20:55:04 GMT