Vacancy expired!
- Investigate Account Takeover and other abuse trends and design new detection and prevention techniques.
- Lead security event response related to account takeover and other abuse.
- Create, document, and follow detailed operational processes and procedures to appropriately analyze, escalate, and remediate customer security issues.
- Make improvements to existing processes and procedures such as automation of manual tasks.
- Partner with teams across the company to evolve detective controls and integrations based on observed fraud and cyber-attack techniques.
- Create Splunk log searches, dashboards, and scheduled reports to help detect and remediate account takeover and other customer security items.
- 5+ years of information security experience.
- Working knowledge of mobile abuse, security solutions, and the systems development lifecycle.
- Strong Splunk or similar skills: 2 years experience working with Splunk, searches and reporting, or the Splunk Core Certified Power User Certification
- Automation or scripting experience.
- Splunk Core Certified Advanced Power User Certification
- Big four consulting background or Fortune 500 company experience.
- Telecom/Mobile/Cable industry experience.
- Incident Response, Security Engineering, or SOC experience.
- At least one relevant industry certification - CISSP, CISM, CISA.
- BS/BA in a related discipline required (i.e., Computer Science, Information Systems, Engineering, Business, etc.)
Vacancy expired!