Company DescriptionIt all started in sunny San Diego, California in 2004 when a visionary engineer, Fred Luddy, saw the potential to transform how we work.
Fast forward to today — ServiceNow stands as a global market leader, bringing innovative AI-enhanced technology to over 8,100 customers, including 85% of the Fortune 500.
Our intelligent cloud-based platform seamlessly connects people, systems, and processes to empower organizations to find smarter, faster, and better ways to work.
But this is just the beginning of our journey.
Join us as we pursue our purpose to make the world work better for everyone.
Job DescriptionThe Global Incident Response (GIR) team consists of 4 units: Triage, Incident Response, Threat Hunting and Insider Threat Program.
You will be joining the Triage team as an Information Security Analyst monitoring the tools and systems that defend ServiceNow's production and corporate environment.
Global Triage team is responsible to provide 24x7x365 continuous monitoring of correlated security event feeds and the appropriate triage and escalation in case of an identified security incident.Triage team is the primary contact for any suspected security incident and works together with the Incident Response team on resolving incidents and remediating threats across ServiceNow enterprise.Define relationships between seemingly unrelated events through deductive reasoning, come up with ways to do things faster, better and more effectively while maintaining a laser focus on quality.You will work on a geographically diverse team to respond to threats that may arise against our infrastructure, and track incidents to closure, working across functional teams.You may be called upon to assist with the deployment, integration and initial configuration of new security solutions or enhancements to existing security solutions, including network and systems to improve overall platform security.The Incident Response Analyst must be able to work outside of normal business hours (evening/weekend shifts, holidays) as needed.You will be required to engage an escalation point of contact in the On-Call rotation, to ensure that Global Incident Response team can respond to priority incidents in a timely manner, and must be willing to work weekend shifts and hours outside of standard business hours, if necessary.QualificationsTo be successful in this role you have: Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving.
This may include using AI-powered tools, automating workflows, analyzing AI-driven insights, or exploring AI's potential impact on the function or industry years related experience or equivalent combination of education and experience.Deep understanding of Security Operations Center and Security Incident Response Team protocols and procedures.A solid foundation in networking fundamentals, with a deep understanding of TCP/IP and other core protocols.Background working with data logging applications (e.g.
Splunk).Knowledge of internet security protocols and technologies.The ability to analyze event and systems logs, perform forensic analysis (good to have), analyze malware, and other incident response related data, as needed.Familiarity with intrusion detection systems and different layers of defense across Endpoint, Email & Network level layers.Knowledge of latest attack vectors, threat tactics and attacker techniques targeting SaaS companies.Understanding of Windows and Linux operating systems and command line tools.Enterprise level analysis and defense experience are a plus.Willingness to work in weekend shifts (no night shifts
).CompTIA Security+, GSEC, CEH (Practical) certifications are good to have.Not sure if you meet every qualification?
We still encourage you to apply
We value inclusivity, welcoming candidates from diverse backgrounds, including non-traditional paths.
Unique experiences enrich our team, and the willingness to dream big makes you an exceptional candidate
#J-18808-Ljbffr