Join our Talent Network

Skip to main content

Corporate Information  |  Careers

Careers Home > Job Search Results > Information Security Sr. SOC Analyst Lead

Information Security Sr. SOC Analyst Lead

Location: Remote -, California, United States
Job ID: R0008579
Date Posted: Apr 30, 2022
Segment: Others (Including Headquarters and R&D )
Business Unit: Hitachi Regional Headquarters
Company Name: Hitachi America, Ltd.
Profession (Job Category): IT, Telecom & Internet
Job Type (Experience Level): Experienced
Job Schedule: Full time
Remote: Yes

Share: mail
Save Job Saved


Information Security Senior SOC Analyst Lead

Company: Hitachi America, Ltd

Division: HAL Information Technology Group (ITG) – Supporting Information Security Team.

Location: remote from Santa Clara, California, Texas, CA, Chicago, Remote

Status: Regular, Full-Time

Hitachi America LTD, located in Santa Clara CA, is the U.S. headquarters Regional Headquarters (RHQ) for Hitachi Limited, based in Tokyo, Japan.

Position Summary:

Hitachi America Ltd (HAL) we are currently seeking a Senior Information Security SOC Analyst lead to join HAL Information Security Team.

The Sr. SOC Analyst Lead will be responsible for the identification and tracking of potential security incidents across HAL Enterprise.  You are part of the first line of defense for HAL Health’s Information Security and responsible for monitoring and responding to security event alerts, by performing log analysis investigations from SIEM.

The ideal candidate must possess +7 years of experience in Information Security, 5-years of experience in: Incident Management, Incident Response, SOC Analyst, endpoint (incl Server) security and network (Incl Cloud) security.   The ideal candidate should possess experience managing Splunk Security Enterprise to receive and look into daily alerts, oversees and configures security monitoring tools, addresses real security incidents and manage testing response plans.   A strong written & verbal communication skill is required.

Job Responsibilities:

  • Identifying cyber security incidents and creating incident tickets, driving incident response activity, and tracking follow up through the complete incident response life cycle.
  • Reviews Splunk SIEM alerts, threat intelligence, and security data. Identifies threats that have entered the network, and security gaps and vulnerabilities currently unknown.
  • Use Splunk Security Enterprise to provide Threat Response services and use threat intelligence such as updated rules and indicators of compromise (IOCs) to pinpoint affected systems and the extent of the attack.
  • Analyzes running processes and configs on affected systems determining when cyber threat containment activity is required and performing containment.
  • Manages and prioritizes actions during isolation, analysis, and containment of an incident.
  • Working alongside Security Operations manager and security architect to deliver asset customized services.
  • Participate in a multi-region (HEU and Hitachi Japan) for a Level 1 SOC analysis, and response to ad-hoc requests for SOC investigations.
  • Supporting continual process improvement initiative by suggesting updates to existing playbooks and using a procedural approach to create new SOP playbooks for new security event alert use cases.
  • Support testing Cybersecurity response plans.

Required Qualification and Skills:

The ideal candidate must meet the following qualifications:

  • Bachelor’s degree in Information Security, Information Systems, Computer Science, Engineering or related field(s) or equivalent demonstrated work experience.
  • 7 years of directly related experience in Information Security Management
  • 5+ years of demonstrated IT Security experience in Incident Management, Incident Response, SOC Analyst, endpoint security (incl Server) and network security (Incl Cloud).
  • 3 years of understanding and knowledge of two or more of the following security related technologies: Intrusion Prevention systems, Web Proxies, SIEM, Firewalls, Web application scanner, Vulnerability Scanners, Malware Research Tools or Forensics Tools
  • Prior Security Analyst experience in Splunk SIEM content management & content creation.
  • Exceptional organizational skills.
  • Strong, professional written and verbal communication skills.

Additional qualifications:

  • Relevant professional certifications or working towards attainment such as: CISSP, GIAC IHRP, CSIH, Network+, Security+, CSA+, etc.)

Equal Opportunity Employer (EOE)-Females/Minorities/Protected Veterans/Individuals with Disabilities

If you need a reasonable accommodation to apply for a job at Hitachi, please send the nature of request and contact information to [email protected] Queries other than accommodation requests will not be responded to.

Share: mail