Help us maintain the quality of jobs posted on PowerToFly.
Let us know if this job is closed.
- Responsible for ensuring information and data on computer systems is protected and all networks and computer systems are adequately secure to prevent unauthorized access; investigates potential security breaches and recommends corrective actions to resolve and/or prevent reoccurrences; responsible for promoting IT security awareness
- Responds to moderatly complex computer security incidents according to the Information Security Policies and Industry Best Practices
- Coordinate efforts to provide timely updates and recommendations to multiple business units during incident response
- Contributes to a team of cyber security professionals working with threat data, writing reports, briefing event details to leadership, and coordinating remediation with personnel
- Analyzes potential impact of new threats and exploits and communicate risks to Cyber Security Engineering
- Monitors information security related web sites (SANS Internet Storm Center, etc.) and mailing lists (BugTraq, etc.) to stay up to date on current attacks and trends
- Ensures technology employed by the Intrusion Analyst team compliments operational processes
- Performs in-depth analysis in support of moderately complex Intrusion detection operations
- Finds anomalous or malicious activity on Cummins networks using analytical methods and tools in an operational environment
- Takes the initiative to understand and master new operating systems, security applications and open source tools
- Performs root cause analysis, and makes recommendations on changes for review by others
- Collects intrusion artifacts (e.g., source code, malware, trojans) and uses discovered data to enable mitigation of potential incidents within the enterprise
- Trouble-shoots complex, cross-business issues within existing security and privacy protections. Performs root cause analysis and makes recommendations on changes
Analyzes identified malicious activity and determines appropriate course of action in response to identified and analyzed anomalous network activity - Performs event correlation using information gathered from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
- Cybersecurity Threat Analysis - Assesses internal and external cybersecurity attacks using cybersecurity standards and tools to identify specific vulnerabilities.
- Cybersecurity Defense Operations - Performs operations according to the Cybersecurity Operations Plan to detect and mitigate potential or real-time internal and external threats.
- Cybersecurity Incident Response - Investigates and analyzes relevant response activities using incident response plans to end malicious activity and restore Cummins business operations.
- Cybersecurity Investigation - Captures and analyzes digital forensic evidence using forensic tools to identify the severity, exposure and threat of exploitation.
- Cybersecurity Digital Forensics - Collects and analyzes computer-related evidence using forensic tools in support of investigations.
- Balances stakeholders - Anticipating and balancing the needs of multiple stakeholders
- College, university, or equivalent degree in Cyber Security, Information Technology or a related subject or equivalent industry experience required
- Responsible for promoting IT security awareness in APAC
- Finds anomalous or malicious activity on Cummins Filtration Networks using analytical methods and tools in an operational environment
- Point of contact for IT and business needs within region on IT infrastructure
- Support business security assessments for 3rd parties and cloud applications
- Supports training and awareness needs within region
About the Company

Cummins Inc.
Columbus, IN, United States
Cummins Inc. is a global power leader with complementary business segments that design, manufacture, distribute and service a broad portfolio of... Read more