Sr. Manager- Security Data Analytics
Yoh, A Day & Zimmermann Company
Culver City, CA
- Expired: over a month ago. Applications are no longer accepted.
Job Description
Sr. Manager, Security Data Analytics is needed for a contract opportunity with Sony Pictures Entertainment located in Culver City, California.
• Provide technical and team leadership to a team of data engineers. You'll split your time between removing technical obstacles for your team, vetting their designs, and coaching them to realize their full potential, while also building things yourself.
• Be a subject matter expert in big data analytics (Splunk/PowerBI/Tableau)
• Oversee the implementation of new analytic techniques and technologies to provide insight into threats to SPE and tool and process effectiveness
• Oversee correlation of multiple data sources to present an effective measurement of SPEs global risk
• Oversee basic programming and development of scripts in support of the data analytics team
• Design, document, and implement a repeatable data onboarding process
• Responsible for ensuring routine (daily, weekly, monthly, quarterly) reports are accurate and produced on time
• Responsible for insuring data health of all critical data systems
• Provide expert level technical advice to the InfoSec team
• Meeting with stakeholders across teams to determine data workflows and documentation
• Managing Workload - Manages multiple tasks, with the ability to deal with ambiguity and shifting priorities
• Some travel may be required
In order to be considered for this role, candidates will need to meet the following background:
Functional knowledge of:
• Expert level knowledge of Splunk (essential)
• Data Analytic approaches and concepts
o Pattern Analysis
o Trend identification
o Cluster analysis
o Predictive Analysis
o Diagnostic Analysis
• Interpreting, searching, and manipulating data within enterprise logging solutions (essential)
• Working with network, host, and user activity data, and identifying anomalies (essential)
• Information security, client/server architectures, and networking (essential)
• Current and evolving cyber threat landscape (essential)
• Threat intelligence and applied use within incident response and forensic investigations (essential)
• Understanding of attack techniques (essential)
• Programming and scripting to support data analysis (essential)
• Multilayer security architectures and controls (desirable)
• Application architecture (mainframes, databases, web, middleware, virtual) (desirable)
• Vulnerability analysis (desirable)
• Training & Awareness through Phishing Simulation (desirable)
Technical/Certification Essential (Must have one or more)
• Information Security certification (SSCP, CISSP, CISM, etc.)
• Incident and Forensic Security certification (GMON / GCIH, etc.)
• Ethical hacking certifications (CEH, etc.)
• Splunk Certified Architect
•Background/Tools/Skills
o Bachelors degree or equivalent working experience
o SIEM Certification (Splunk, ArcSight, PowerBi, Etc.)
o 7+ years of experience in Data Analytics or Data Science
o 7+ years of experience in Security Operations and/or Security Engineering
o 3+ years leading a team or program
o 2+ years of experience in Incident Response and/or Cyber Threat
o 2+ years managing vendor relationships
• Tool Experience
o Big Data Tools: Splunk, PowerBi, ArcSight (essential)
o Ticketing Systems: ServiceNow / Jira / Archer (desirable)
o Endpoint Security Products: McAfee / Qualys / Symantec DLP / Window Event Logs / Linux Auditd/ Sysmon (essential)
o Network Security Products: PaloAlto, Cisco (essential)
• Knowledge of
o Logging strategies, formats, and best practices (essential)
o Data analytic techniques (essential)
o Reporting and Dashboard development and execution (essential)
o Cloud Environments (AWS, Azure, GCP, O365) (desirable)
o Hacker techniques, tools, and motivations
o Operating systems (Windows, OS X, Linux and UNIX) (essential)
o Network architecture (firewalls, routers, switches and load balancers) (essential)
o Security technologies (IDS/IPS, advanced endpoint protection, AV) (essential)
o Applicable data privacy laws (CCPA, CPRA, GDPR, etc.) (essential)
• Experience in:
o Analyzing and onboarding various security logs (essential)
o Assessing technology deployment and/or environment for implementation of best practice and/or creative logging solutions to support InfoSec and business needs
o Excellent data analysis skills (essential)
o Experience supporting a SOC (Security Operations Center)
o Experience developing security use cases and alerting
o Problem solving with missing information while under pressure with short deadlines (essential)
o Indicator pivoting, tracking and analysis (essential)
o Ability to prioritize multiple tasks rapidly, formulate a plan, delegate tasks, respond quickly and communicate with customers and leadership (essential)
o Generating both technical and executive reports, dashboards, and briefings (essential)
o Working with and communicating with IT tool and solution owners (essential)
• Other Desirable Skills:
o Programming in one or more of the following: SPL, SQL, Python, ASM (desirable)
o Shell scripting in one or more of the following: Perl, Bash, PHP, WMI, PowerShell (desirable)
• Ability to:
o Manage an offshore team (14 people)
o Ability to develop and communicate a team strategy
o Take on new responsibilities and influence others as needed to deliver consistent results
o Work in a global environment and manage issues across multiple locations
o Strong written & verbal communications skills
o Strong organizational and multi-tasking skills
o Pick up new skills through self-learning and on the job training
o Innovate and stay current on security technologies
o Attention to detail with flexibility in addressing changing requirements
If This Sound Like You, Apply Now!
Note: Any pay ranges displayed are estimations. Actual pay is determined by an applicant's experience, technical expertise, and other qualifications as listed in the job description. All qualified applicants are welcome to apply.
Yoh, a Day & Zimmermann company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Visit https://www.yoh.com/applicants-with-disabilities to contact us if you are an individual with a disability and require accommodation in the application process.
- 6 months contract with possibility of conversion to permanent employee
- Pay range up to $84.46/hr Depending on Experience
- Hybrid- 3x a week onsite
- Must have the legal right to work in the United States ( client is unable to do sponsorship or Corp to Corp)
• Provide technical and team leadership to a team of data engineers. You'll split your time between removing technical obstacles for your team, vetting their designs, and coaching them to realize their full potential, while also building things yourself.
• Be a subject matter expert in big data analytics (Splunk/PowerBI/Tableau)
• Oversee the implementation of new analytic techniques and technologies to provide insight into threats to SPE and tool and process effectiveness
• Oversee correlation of multiple data sources to present an effective measurement of SPEs global risk
• Oversee basic programming and development of scripts in support of the data analytics team
• Design, document, and implement a repeatable data onboarding process
• Responsible for ensuring routine (daily, weekly, monthly, quarterly) reports are accurate and produced on time
• Responsible for insuring data health of all critical data systems
• Provide expert level technical advice to the InfoSec team
• Meeting with stakeholders across teams to determine data workflows and documentation
• Managing Workload - Manages multiple tasks, with the ability to deal with ambiguity and shifting priorities
• Some travel may be required
In order to be considered for this role, candidates will need to meet the following background:
Functional knowledge of:
• Expert level knowledge of Splunk (essential)
• Data Analytic approaches and concepts
o Pattern Analysis
o Trend identification
o Cluster analysis
o Predictive Analysis
o Diagnostic Analysis
• Interpreting, searching, and manipulating data within enterprise logging solutions (essential)
• Working with network, host, and user activity data, and identifying anomalies (essential)
• Information security, client/server architectures, and networking (essential)
• Current and evolving cyber threat landscape (essential)
• Threat intelligence and applied use within incident response and forensic investigations (essential)
• Understanding of attack techniques (essential)
• Programming and scripting to support data analysis (essential)
• Multilayer security architectures and controls (desirable)
• Application architecture (mainframes, databases, web, middleware, virtual) (desirable)
• Vulnerability analysis (desirable)
• Training & Awareness through Phishing Simulation (desirable)
Technical/Certification Essential (Must have one or more)
• Information Security certification (SSCP, CISSP, CISM, etc.)
• Incident and Forensic Security certification (GMON / GCIH, etc.)
• Ethical hacking certifications (CEH, etc.)
• Splunk Certified Architect
•Background/Tools/Skills
o Bachelors degree or equivalent working experience
o SIEM Certification (Splunk, ArcSight, PowerBi, Etc.)
o 7+ years of experience in Data Analytics or Data Science
o 7+ years of experience in Security Operations and/or Security Engineering
o 3+ years leading a team or program
o 2+ years of experience in Incident Response and/or Cyber Threat
o 2+ years managing vendor relationships
• Tool Experience
o Big Data Tools: Splunk, PowerBi, ArcSight (essential)
o Ticketing Systems: ServiceNow / Jira / Archer (desirable)
o Endpoint Security Products: McAfee / Qualys / Symantec DLP / Window Event Logs / Linux Auditd/ Sysmon (essential)
o Network Security Products: PaloAlto, Cisco (essential)
• Knowledge of
o Logging strategies, formats, and best practices (essential)
o Data analytic techniques (essential)
o Reporting and Dashboard development and execution (essential)
o Cloud Environments (AWS, Azure, GCP, O365) (desirable)
o Hacker techniques, tools, and motivations
o Operating systems (Windows, OS X, Linux and UNIX) (essential)
o Network architecture (firewalls, routers, switches and load balancers) (essential)
o Security technologies (IDS/IPS, advanced endpoint protection, AV) (essential)
o Applicable data privacy laws (CCPA, CPRA, GDPR, etc.) (essential)
• Experience in:
o Analyzing and onboarding various security logs (essential)
o Assessing technology deployment and/or environment for implementation of best practice and/or creative logging solutions to support InfoSec and business needs
o Excellent data analysis skills (essential)
o Experience supporting a SOC (Security Operations Center)
o Experience developing security use cases and alerting
o Problem solving with missing information while under pressure with short deadlines (essential)
o Indicator pivoting, tracking and analysis (essential)
o Ability to prioritize multiple tasks rapidly, formulate a plan, delegate tasks, respond quickly and communicate with customers and leadership (essential)
o Generating both technical and executive reports, dashboards, and briefings (essential)
o Working with and communicating with IT tool and solution owners (essential)
• Other Desirable Skills:
o Programming in one or more of the following: SPL, SQL, Python, ASM (desirable)
o Shell scripting in one or more of the following: Perl, Bash, PHP, WMI, PowerShell (desirable)
• Ability to:
o Manage an offshore team (14 people)
o Ability to develop and communicate a team strategy
o Take on new responsibilities and influence others as needed to deliver consistent results
o Work in a global environment and manage issues across multiple locations
o Strong written & verbal communications skills
o Strong organizational and multi-tasking skills
o Pick up new skills through self-learning and on the job training
o Innovate and stay current on security technologies
o Attention to detail with flexibility in addressing changing requirements
If This Sound Like You, Apply Now!
Note: Any pay ranges displayed are estimations. Actual pay is determined by an applicant's experience, technical expertise, and other qualifications as listed in the job description. All qualified applicants are welcome to apply.
Yoh, a Day & Zimmermann company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Visit https://www.yoh.com/applicants-with-disabilities to contact us if you are an individual with a disability and require accommodation in the application process.
Yoh, A Day & Zimmermann Company

Address
Culver City, CA
USA
Industry
Technology
Get fresh Cyber Data Analyst jobs daily straight to your inbox!
By clicking the button above, I agree to the ZipRecruiter Terms of Use and acknowledge I have read the Privacy Policy, and agree to receive email job alerts.
You Already Have an Account
We're sending an email you can use to verify and access your account.
If you know your password, you can go to the sign in page.