At a Glance
- Tasks: Monitor and respond to cybersecurity incidents while enhancing security tools and processes.
- Company: Join KLA, a leader in semiconductor solutions with a focus on innovation.
- Benefits: Enjoy 25 days annual leave, pension scheme, health plan, and more!
- Why this job: Make a real impact in cybersecurity and protect vital company assets.
- Qualifications: Experience in cybersecurity and familiarity with SOC operations required.
- Other info: Dynamic team environment with opportunities for growth and development.
The predicted salary is between 36000 - 60000 Β£ per year.
Company Overview
SPTS division of KLA designs, manufactures and markets wafer processing solutions for the global semiconductor and related industries. SPTS provides industry leading etch and deposition process technologies on a range of single wafer handling platforms. End-market applications include MEMS, advanced packaging, LED, high speed RF device ICs and power semiconductors. SPTS is part of KLA Corporation which develops industry-leading equipment and services that enable innovation throughout the electronics industry. We provide advanced process control and process-enabling solutions for manufacturing wafers and reticles, integrated circuits, packaging, printed circuit boards and flat panel displays. In close collaboration with leading customers across the globe, our expert teams of physicists, engineers, data scientists and problem-solvers design solutions that move the world forward.
Job Description / Preferred Qualifications
The Cybersecurity group at KLA is involved in every aspect of the global business. The KLA Cybersecurity group defends against cyber-attacks and provides cybersecurity tools, incident response services and assessment capabilities to safeguard the environments that support the essential operations of KLA. We are passionate about identifying adversarial activities and anticipating a wide variety of threats to strengthen our defenses and the overall protection of KLA Intellectual Property.
The SOC Analyst is responsible for incident response, threat hunting, and maintaining the security tools that are used to secure our environment. This individual will have a specific focus on Incident Response, tuning detection rule-sets, and generating and responding to tickets across relevant IT and Cybersecurity teams.
Essential Duties and Responsibilities
- As an active member of the team, which monitors and process responses for security events on a 24Γ7 basis.
- Security alert monitoring, triage, and analysis to prioritize and differentiate between potential intrusion attempts and false alarms.
- Actively perform detection, monitoring, analysis, and resolution of security incidents.
- Must be able to prioritize their own work and tasks for response
- Participate in the execution of regular incident response and postmortem exercises.
- Facilitate the development and tuning of AV, EDR, SIEM, and DLP rules to ensure high fidelity alerting.
- Communication with management as the need arises: keeping informed of incident progress, notifying of impending changes or agreed outages.
- Generate reports from different data sources and present to management as required.
- Must be able to maintain awareness of trends in security regulatory, technology, and operational requirements.
Additional Duties and Responsibilities
- Some domestic and/or international travel (up to 10%) may be required.
- Ability to communicate clearly with other team members
What we will offer you?
KLA\\\βs benefits package includes: Annual leave starting at 25 days (plus bank holidays), contributory pension scheme, cash health plan, cycle to work scheme, global bonus plan, share scheme, rewards scheme and life assurance!
We offer a competitive, family friendly total rewards package. We design our programs to reflect our commitment to an inclusive environment, while ensuring we provide benefits that meet the diverse needs of our employees.
KLA is proud to be an equal opportunity employer.
Minimum Qualifications
- Extensive related experience in cybersecurity or related technologies such as: firewalls/AV/EDR/IPS/IDS/SIEM, and forensic tools.
- Experience working in or with a Security Operations Center (SOC) in an Incident Responder role.
- Proficiency in Operating Systems (Windows/Linux/Mac).
- Technical awareness: ability to match resources to technical issues appropriately.
Preferred Qualifications
- Bachelor\\\βs Degree or equivalent experience in an Information Security/related IT field.
- Relevant security related certification(s) a plus: CISSP, GCIA, GSEC, GCIH, GCED, GCFA, GREM.
KLA is proud to be an equal opportunity employer.
Be aware of potentially fraudulent job postings or suspicious recruiting activity by persons that are currently posing as KLA employees. KLA never asks for any financial compensation to be considered for an interview, to become an employee, or for equipment. Further, KLA does not work with any recruiters or third parties who charge such fees either directly or on behalf of KLA. Please ensure that you have searched KLAβs Careers website for legitimate job postings. KLA follows a recruiting process that involves multiple interviews in person or on video conferencing with our hiring managers. If you are concerned that a communication, an interview, an offer of employment, or that an employee is not legitimate, please send an email to talent.acquisition@kla.com to confirm the person you are communicating with is an employee. We take your privacy very seriously and confidentially handle your information.
#J-18808-Ljbffr
Cybersecurity Analyst (SOC) Mid Level employer: KLA
Contact Detail:
KLA Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Cybersecurity Analyst (SOC) Mid Level
β¨Tip Number 1
Network like a pro! Reach out to folks in the cybersecurity field, especially those working at KLA. Use LinkedIn to connect and engage with them; you never know who might give you a heads-up about job openings or even refer you directly!
β¨Tip Number 2
Prepare for interviews by brushing up on your incident response skills. Be ready to discuss real-life scenarios where you've tackled security incidents. Show us how you think on your feet and your approach to threat hunting!
β¨Tip Number 3
Donβt just apply anywhereβapply through our website! Itβs the best way to ensure your application gets seen by the right people. Plus, it shows youβre genuinely interested in being part of the KLA team.
β¨Tip Number 4
Stay updated on the latest cybersecurity trends and tools. Being knowledgeable about current threats and technologies will not only help you in interviews but also show us that you're passionate about the field!
We think you need these skills to ace Cybersecurity Analyst (SOC) Mid Level
Some tips for your application π«‘
Tailor Your CV: Make sure your CV highlights your relevant experience in cybersecurity, especially any work with SOCs or incident response. We want to see how your skills match the job description, so donβt be shy about showcasing your expertise!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why youβre passionate about cybersecurity and how you can contribute to our team at KLA. Keep it concise but impactful β we love a good story!
Show Off Your Technical Skills: In your application, make sure to mention any specific tools or technologies youβve worked with, like firewalls, SIEM, or EDR systems. Weβre looking for candidates who can hit the ground running, so let us know what you bring to the table!
Apply Through Our Website: We encourage you to apply directly through our website. Itβs the best way to ensure your application gets into the right hands. Plus, youβll find all the details you need about the role and our company culture there!
How to prepare for a job interview at KLA
β¨Know Your Cybersecurity Basics
Make sure you brush up on your knowledge of firewalls, AV, EDR, and SIEM tools. Be ready to discuss how you've used these technologies in past roles, especially in incident response scenarios.
β¨Showcase Your Incident Response Skills
Prepare specific examples of incidents you've handled. Talk about your approach to triaging alerts and how you differentiate between real threats and false positives. This will demonstrate your practical experience in a SOC environment.
β¨Stay Updated on Security Trends
Familiarise yourself with the latest trends in cybersecurity regulations and technologies. Being able to discuss current threats and how they impact businesses will show that you're proactive and engaged in the field.
β¨Communicate Clearly and Confidently
Practice articulating your thoughts clearly, especially when discussing technical concepts. Good communication is key in a team setting, so be prepared to explain complex ideas in a way that's easy to understand.