Your browser does not support javascript! Please enable it, otherwise web will not work for you.

Security Analyst II @ UKG

Home > IT Security

 Security Analyst II

Job Description

As a Level 2 (L2) Security and Threat Monitoring Analyst, you will be part of UKGs Global Security Operations Center (GSOC) team investigating events of interest and incidents as they are validated, prioritized, and categorized. You will facilitate and follow UKGs standard processes to investigate, contain, eradicate, and respond in a continued and unified effort to protect the confidentiality, integrity, and availability of UKG, our partners and customers data and services.
You will be the initial escalation point for all incidents, either regionally or during shift assignment; analyzing, confirming, re-prioritizing if necessary and/or escalating/remediating those identified threats within the UKG computing environment. You will work closely with UKGs GSOC teams in the US, Europe, and India to promote an integrated, uniform, and holistic threat detection and response capability to facilitate and enable a robust and proactive security posture.
Additionally, you will be responsible for participating in incident response activities as part of the Cyber Incident Response Team (CIRT), post incident reporting and continuous improvement recommendations to enhance UKGs security posture through process development, tool rationalization, detection technique and automation enhancement opportunities and enablement/training possibilities.
Shift Schedule:
Flexibility to work different shifts (morning, afternoon, and night) on a rotational basis.
Willingness to be on-call for emergency situations outside of regular hours.
Due to the nature of the work, you are required to have on-call duties on weekends. Additional work hours may also be required during an incident investigation.

Primary/Essential Duties and Key Responsibilities:
Review tickets escalated from L1 analysts to confirm the priority, category and accuracy of the details and conditions.
Pivot to additional security tools to obtain and ascertain context or additional information.
Collaborate with UKG internal and external groups to develop and execute containment, eradication, and recovery strategies for lower priority incidents.
Identify and implement blocking, listing and other mechanisms to promote a robust security posture.
Escalate tickets as required to L3 for additional scrutiny or for further escalations.
Participate in the Cyber Incident Response Plan (CIRP) process as part of the Cyber Incident Response Team (CIRT) for mitigating and/or remediating critical incidents.
Participate in post-incident activities including coordinating and providing input within the requisite reports and identifying areas for continuous improvements within the GSOC enablement, processes or technology.
Provide mentoring and enablement of junior analysts globally to expand and extend UKGs GSOC capabilities and experiential capacities.

Qualification (Experience, Education, Certification, License and Training):
Bachelor's degree in computer science or a related discipline
CISSP, CCSP, GIAC or other relevant cyber security certifications (preferred)
Working professional with 3+ years of relevant Security/SOC experience

Required Qualifications:
Knowledge of the common attack vectors on the network layer, different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
Knowledge of cybersecurity, incident response methodologies, privacy principles, cyber threats, vulnerabilities, and detection methodologies and techniques for detecting intrusions.
Knowledge of or functional experience with Splunk, EDR solutions, email security tools, MS Azure security portfolio, and cloud environments (GCP, Azure).
Communicate in English: write clearly and speak authoritatively to different audiences (business leaders and engineers).
Preferred Qualifications:
Knowledge of new and emerging cybersecurity technologies, threats, and threat vectors.
Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored) and cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
Knowledge and experience in developing automations using scripting languages like Python and PowerShell to automate various tasks and improve accuracy, enhance task consistency, and increase scalability.
Knowledge and experience in conducting and participating in security audits and assessments.

Job Classification

Industry: IT Services & Consulting
Functional Area / Department: IT & Information Security
Role Category: IT Security
Role: Security Engineer / Analyst
Employement Type: Full time

Contact Details:

Company: UKG
Location(s): Noida, Gurugram

+ View Contactajax loader


Keyskills:   Security Analysis PowerShell Azure GCP MS Azure security security audits Cyber Incident Response Plan cybersecurity

 Job seems aged, it may have been expired!
 Fraud Alert to job seekers!

₹ Not Disclosed

Similar positions

Cyber Security Lead

  • Capgemini
  • 5 - 9 years
  • Chennai
  • 4 days ago
₹ Not Disclosed

Network and Security Engineer L2

  • Orange Business
  • 5 - 10 years
  • Bengaluru
  • 9 days ago
₹ Not Disclosed

Security Architect

  • Accenture
  • 8 - 13 years
  • Hyderabad
  • 17 days ago
₹ Not Disclosed

Security Architect

  • Accenture
  • 8 - 13 years
  • Hyderabad
  • 17 days ago
₹ Not Disclosed

UKG

Ultimate Kronos Group (UKG) is an American Multinational Technology company with dual headquarters in Lowell, Massachusetts, and Weston, Florida.At UKG, our purpose is people. Formed by three leaders in HR solutions, UKG combines the strength and innovation of Ultimate Softwar...