CHEP helps move more goods to more people, in more places than any other organization on earth via our 300 million pallets, crates and containers. We employ 11,000 people and operate in more than 55 countries. Through our pioneering and sustainable share-and-reuse business model, the world’s biggest brands trust us to help them transport their goods more efficiently, safely and with less environmental impact.
What does that mean for you? You’ll join an international organization big enough to take you anywhere, and small enough to get you there sooner. You’ll help change how goods get to market and contribute to global sustainability. You’ll be empowered to bring your authentic self to work and be surrounded by diverse and driven professionals. And you can maximize your work-life balance and flexibility through our Hybrid Work Model.
Job Description
This position reports to the Director, Cyber Security Operations and is responsible for ensuring that the response to Cyber Security events and incidents are timely, appropriate, thorough, and meet the highest security standards.
This will be achieved through 2 main factors:
- Lead their region coverage to respond to, investigate, resolve/isolate, and support remediation for security escalations through partnership with outside vendors, the Security Operations Centre, and the wider Infrastructure Teams and Service Desk
- The appropriate design, selection, delivery and documentation of Cyber Incident handling and response processes, covering all Technology, but with a specific focus on the cloud environment.
This role is key in supporting Brambles Cyber Security threat analysis and incident response program and is responsible for ensuring that security events are effectively analysed, and appropriate response measures are taken in support of the corporate Cyber program.
Major/Key Accountabilities
- Primary point of contact for Cloud Cyber Security Incident response (e.g. AWS, Azure, SAAS solutions, etc) in the Cyber Security Escalations team.
- Provide leadership and support to cloud infrastructure teams with respect to cloud security and incident response support, with the shared responsibility of providing overall Incident Response for the company.
- Provide a first point of contact for L3 security escalations from the SOC team, ensuring a thorough review, escalation and management capability is maintained.
- Drive the identification and remediation of security vulnerabilities and ensure new ways of reducing the Time-To-Fix are identified. Ensure threat and risk analysis is conducted and provide essential recommendations in coordination with cloud teams.
- Participate in Security Incident Response Team (SIRT) in the identification, containment, eradication, and resolution of security issues.
- Facilitate requests from business contacts in local time zones to provide a global support framework.
- Conduct risk assessments and business impact analysis on new cloud and SAAS systems and technologies.
- Maintain detailed knowledge of the Cyber security industry including awareness of new or revised security solutions, improved security processes and the identification and resolution of vulnerabilities and threat vectors.
- Provide recommendations for additional security solutions or enhancements to existing controls, to improve overall enterprise security and “defense in depth” strategy.
- Participate in the deployment, integration and initial configuration of all new security solutions as well as enhancements to existing security solutions in accordance with standards and best practices.
- Maintain operational configurations of all IT security solutions as per any established baselines.
- Monitor all security solutions for efficient and appropriate operations.
- Generating trouble tickets and performing initial validation and triage to determine whether incidents are security events using open-source intelligence (OSINT)
- Review logs and reports of all devices, whether they are under direct control (i.e., security tools) or indirect control (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution.
- Hunt for advanced threats, pivoting on and analysing data to identify malicious behaviours. Perform real-time incident handling, independently following and creating procedures to analyse and contain malicious activity. Collect evidence to include digital media, logs, and malware to perform analysis associated with cyber intrusions.
- Maintain an understanding of attack methodologies and use information operationally. Make recommendations and create or modify processes and procedures based on knowledge of advanced threat behaviours. Identify and analyse threats, using OSINT, Threat Intelligence and leveraging enrichment resources.
- Develops and enhances content and methods for monitoring and incident response, leveraging data extraction techniques for further analysis. Develops and enhances processes, work flows, and documentation. Determine high fidelity behavioural patterns and create content in multiple tools.
Experience
- Experience – 4 – 6 years in IT security related roles; 1 + years of cloud security experience required.
- Strong understanding of cloud environments and cloud security technologies, risks, issues and threat vectors.
- Experience of active cloud defence techniques and tooling desirable.
- Familiarity with system monitoring, assessment and reporting tools (e.g. SIEM, VM tooling etc)
- Proficiency in network security and monitoring tools.
- Lead threat-hunt and remediation efforts with OT and IoT technologies and implement attack-surface reduction techniques.
- Firewall management (Cisco, Palo Alto etc).
- Escalates potential risk and internal control weaknesses to management.
- Experience with Vulnerability and Malware Analysis (threat and attack analysis).
- Experience with security tools (IDS, firewalls, anti-virus, data loss prevention, etc.).
- Experience working with security governance frameworks (NIST, ISO27001, COBIT).
- Knowledge of Cloud Security Operations (SaaS, PaaS, IaaS), Mobile Architecture, Network and Application Security and/or Data Protection.
Qualifications
Desirable
- Bachelor’s degree in Computer Science, Information Systems, Business or related field, Masters preferred or equivalent combination of education/experience.
- One or more certifications in: CISSP, CISA, CISM, CHFI, GISP, GCFA, GCED, GCIA or similar industry standard certifications. One or more advanced cloud certifications desired (AWS Architect, etc).
Skills and Knowledge
- Should possess a proficient understanding of e-mail filtering, URL filtering, antivirus, IDS, vulnerability scanning, 2-factor authentication, access control systems, SIEM and VMware products.
- Experience with common information technologies (Windows, VMware, and Cisco as well as some UNIX, Linux)
- Ability to demonstrate successful implementation techniques based on industry established best practices.
- Outstanding verbal and written communications skills with all levels of management, staff, and vendors.
- Demonstrates accuracy and thoroughness. Looks for ways to improve and promote quality and monitors own work to ensure quality is met.
Preferred Education
Degree and equivalent - Information Technology
Preferred Level of Work Experience
5 - 7 years
Remote Type
Hybrid Remote
We are an Equal Opportunity Employer, and we are committed to developing a diverse workforce in which everyone is treated fairly, with respect, and has the opportunity to contribute to business success while realizing his or her potential. This means harnessing the unique skills and experience that each individual brings and we do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Individuals fraudulently misrepresenting themselves as Brambles or CHEP representatives have scheduled interviews and offered fraudulent employment opportunities with the intent to commit identity theft or solicit money. Brambles and CHEP never conduct interviews via online chat or request money as a term of employment. If you have a question as to the legitimacy of an interview or job offer, please contact us at recruitment@brambles.com.