This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Expert Incident Response Cybersecurity Analyst. This role has been designed as ‘Hybrid’ with an expectation that you will work on average 2 days per week from an HPE office. You will be responsible for protecting HPE’s information, assets, and ensuring the security of our organization. You will work closely with our Cyber Defense Center team to identify, analyze, and respond to security threats. This is a highly technical role that requires a strong understanding of cyber security principles and a passion for protecting our users' data.
Job Responsibility:
Monitor and analyze network traffic, logs, and alerts to identify and respond to security incidents
Conduct in-depth investigations of security incidents, including root cause analysis and impact assessment
Develop and maintain security tools and processes to improve the efficiency and effectiveness of the Cyber Defense Center
Collaborate with other teams, including IT, Legal, and Communications, to ensure a coordinated response to security incidents
Provide expert advice and guidance to other teams on cyber security best practices and risk management
Combines deep industry expertise with a thorough understanding of information and security technology to effectively analyze associated logs and respond to high severity incidents
Contributes to the company's security response methods, suggesting automation opportunities which can enhance IR
Mentor and provide technical guidance to less experienced cybersecurity professionals
Stay at the forefront of cybersecurity trends, threats, and technologies, driving innovation within the organization's threat detection and response capabilities
Foster a culture of continuous improvement and innovation, encouraging the adoption of new technologies and methodologies within the team
Requirements:
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field or equivalent experience desired
6+ years of experience in cybersecurity, with a focus on incident response and threat analysis desired
Proven experience in security tools and technologies, including SIEM, EDR, and Incident ticketing technology
Strong knowledge & understanding of common attack vectors and threat actor tactics, techniques, and procedures
Expertise in Security Information and Event Management (SIEM) tools and related security platforms
Demonstrates exceptional proficiency in performing log analysis across common environments (Windows, Linux, AWS, Azure, GCP)
In-depth knowledge of common security threats, vulnerabilities, and attack methodologies – including advanced persistent threats (APTs) and zero-day exploits
Extensive experience with performing in-depth incident investigation, documenting findings, and developing actionable remediation plans
Strong communication skills
Ability to work independently and on high-impact projects in fast-paced environments
Ability to collaborate with cross-functional teams
Nice to have:
Certifications: Certified Information Systems Security Professional (CISSP), CompTIA Security+, GIAC Certified Incident Handler (GCIH), IC2 Certified Cloud Security Professional
Accountability, Action Planning, Active Learning, Active Listening, Agile Methodology, Bias, Business, Coaching, Creativity, Critical Thinking, Cybersecurity, Data Analysis Management, Data Collection Management, Data Controls, Design Thinking, Development Methodologies, Empathy, Follow-Through, Growth Mindset, Implementation Methodologies, Infrastructure Design, Intellectual Curiosity, Long Term Planning, Managing Ambiguity