Requisition ID: COM******
Merck & Co., Inc. Kenilworth, N.J., U.S.A. known as Merck in the United States and Canada, is a global health care leader with a diversified portfolio of prescription medicines, vaccines and animal health products. The difference between potential and achievement lies in the spark that fuels innovation and inventiveness; this is the space where Merck has codified its legacy for over a century. Merck’ success is backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare.
The Triage Analyst supports Merck’ Incident Response by responding to escalated alerts and monitoring alerts during heavy volume events. This position conducts more in-depth analyses of security incidents with the specific ability to identify Indicators of Compromise, perform intrusion scope and root cause analyses and implement triaging protocols to mitigate potential damage to Merck’ cyber ecosystem.
Develops and updates procedures, and configure tools for Monitoring Analysts consumptionEscalates cyber security events according to Merck’ playbook and standard operation procedures (SOPs)
Performs itional analysis of escalations from Monitoring Analysts and conduct case review
Assists with containment of threats and remediation of environment during or after an incident
Escalates high or critical severity level incidents to Incident Investigators
Consumes threat intelligence and disseminate findings to relevant parties
Conducts hunting activities based on internal and external threat intelligence
Performs triage of service requests from customers and internal teams
Education Minimum Requirement:
BA/BS in Engineering, Computer Science, Information Security, or Information Systems or related work experience
Required Experience and Skills:
Experience using event escalation and reporting procedures
Ability to demonstrate analytical expertise, close attention to detail, excellent critical thinking, logic, and solution orientation and to learn and adapt quickly
Understanding TCP/IP communications & knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB
Knowledge of how the Windows file system and registry function
Experience managing cases with enterprise SIEM systems
Experience with network monitoring in a SOC environment
Preferred Experience and Skills:
Experience with Splunk, OSSEC and McAfee security products
Experience conducting forensic media analysis and log file analysis
Experience supporting incident investigations
Experience working in a 24/7 SOC environment
Security certifications (e.g. Security+, Network+, CEH, SANS etc.)
Please note that this role will work a rotational shift.
Our role at Merck is integral to helping the world meet new breakthroughs that affect generations to come, and we’re counting on your skills and inventiveness to help make meaningful contributions to global medical advancement. At Merck, we’re inventing for life.
If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to ***********************.
Search Firm Representatives Please Read Carefully:
Merck & Co., Inc. is not accepting unsolicited assistance from search firms for this employment opportunity. Please, no phone calls or emails. All resumes submitted by search firms to any employee at Merck via email, the Internet or in any form and/or method without a valid written search agreement in place for this position will be deemed the sole property of Merck. No fee will be paid in the event the candidate is hired by Merck as a result of the referral or through other means.
Visa sponsorship is not available for this position.
To apply for this job please visit itjobpro.com.