Skip to main content

Information Security Analyst I

  • Posted
  • Ann Arbor, Michigan, United States
  • Domino's Pizza LLC

About Us

Domino’s Pizza, which began in 1960 as a single store location in Ypsilanti, MI, has had a lot to celebrate lately: we’re a reshaped, reenergized brand of honesty, transparency and accountability – not to mention, great food! In the rise to becoming a true technology leader, the brand is now consistently one of the top five companies in online transactions and 65% of our sales in the U.S. are taken through digital channels. The brand continues to ‘deliver the dream’ to local business owners, 90% of which started as delivery drivers and pizza makers in our stores. That’s just the tip of the iceberg…or as we might say, one “slice” of the pie! If this sounds like a brand you’d like to be a part of, consider joining our team!

Job Details

OVERVIEW

Domino’s Information Security group is rapidly expanding its security program and designing new processes and practices. We are currently looking for a strong security professional with pragmatic experience in proactively investigating security events to identify artifacts of a cyber-attack.

This position performs accurate and precise real-time analysis and correlation of logs/alerts from a multitude of users, devices and other elements with a focus on the determination of whether said events constitute security incidents. Analyze and assess security incidents and escalate to stakeholders or appropriate internal teams for additional assistance. Manage all users, stakeholders, franchisees, customers, and vendors’ interactions in a professional manner with emphasis on delivery quality and effective services.

SOC Analyst will manage and monitor events from internal security devices, and authentication services associated with Domino's security controls. SOC Analyst will possess technical analytical skills while providing accurate analysis of security-related problems. They have a well-rounded networking background and are responsible for performing extensive troubleshooting of security issues in the fast-paced SOC. This individual is user focused and works to resolve SOC needs in a timely manner. These needs may involve resolving hardware/software failures, investigating and responding to security threats, and making change requests to the security policy of company devices.

RESPONSIBILITIES AND DUTIES 

 Responsibility #1 (100%) Level 1 Analyst

  • The SOC Analyst must be willing and able to work outside normal business hours to include night and/or weekend on-call rotation. Coordinates with other Information Technology areas to resolve problems, as necessary.
  • Provide technical support during assigned shift hours; according to the process and procedures defined by Dominos. This involves handling events such as identifying user security issues, extensive troubleshooting, and coordinating resolution or restore using a variety of applications and testing tools. The events can include hardware/software failures as well as security breaches, threats, or network connectivity issues. Regularly provide high-level proactive technical support, including security configurations, security policy modification recommendation, and diagnostics of remote network security issues.
  • Professionally and courteously answer inbound security-related calls and provide users with the best possible customer service and experience, create tickets, generate trouble tickets for all work and informational requests, handle security-related user complaints, and escalate according to established procedures.
  • Handle incident, users, stakeholders, franchisees and customers’ requests and questions received via e-mail or an internal ticketing system in a timely and detail-oriented manner in order to resolve a multitude of information security related incidents. Interact with, configure, and troubleshoot SIEM platform, Endpoint systems and other related systems via proprietary and commercial consoles. Meet service level agreements regarding response time and client notification.
  • Ensure that the company is implementing best practice security policies that address business needs while protecting vital corporate assets. Individual must be able to perform with minimal supervision of routine duties; must demonstrate ability to solve practical problems and deal with a variety of concrete variables in situations where limited standardization exists; interpret written, and oral instructions, diagram, or schedule formats; and be able to handle multiple tasks simultaneously.
  • Demonstrate excellent communication and service skills by documenting all analysis work and communications within a ticketing system. Meet service level agreements regarding response time and proper notification. Remotely manage devices and security systems to correct problems. Manage, participate in, or directly work on any additional projects, assignments, or initiatives assigned by management. Utilize internal guidelines in order to properly handle service requests and questions.
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of Domino’s security policies, through proactive monitoring and discovery of threats.
  • Provides guidance and work leadership to less-experienced technical SOC members.
  • Participates in special projects as required.

Required Skills

  • Proactivity: Ability to assess and evaluate measures that would be valuable for test or program consideration.
  • Innovation and Resourcefulness: Sense of innovation, creativity, and resourcefulness necessary to ensure test designs and execution steps are valuable and crafted to drive maturity.
  • Self-Motivation: Ability to be self-driven and engaged while maintaining productivity and team progress. Actively seeing new ways to grow and be challenged, using both formal and informal development channels
  • Communicates Effectively: Developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences. Applies influence and negotiation skills to drive business results.
  • Situational Adaptability: Adapting approach and demeanor in real time to match the shifting demands of different situations. Commitment to excellence and willingness to do what is necessary to get the job done
Qualifications
  • Significant theoretical and practical knowledge in the following areas:
  • Operations Systems: Windows, Unix, Linux, etc.
  • Well-known networking protocols and services (FTP, HTTP, SSH, SMB, LDAP, etc.)
  • Exploits, vulnerabilities, network attacks
  • Packet analysis tools optional but desirable (tcpdump, Wireshark, ngrep, nmap, etc.)
  • Regular expressions optional but desirable
  • Basic understanding of Windows or Linux operating systems including:
  • Managing processes
  • Active Directory
  • Obtaining system statistics such as CPU, memory, disk, network interface utilization from the command line Identifying potential problems from system logs
  • Excellent problem-solving skills that would allow for the ability to diagnose and troubleshoot technical issues. Service-oriented with a strong interest in end-user satisfaction.
  • Excellent written and verbal communication skills, Time management and organizational skills.
  • Rudimentary understanding of intrusion detection/prevention, firewall operations, and other general security practices. Solid understanding of computer network fundamentals including address resolution protocol, routing, network address translation, virtual private networks, and the OSI model.
  •  Knowledge and experience with PCs, LAN topologies, routers, hubs, VPN technology and terminal servers. Knowledge of security applications such as IDS, Security Event Management and anomaly detection tools.
  • Ability to read and interpret network diagrams, and to read and understand packet captures (desirable).
  • Minimum of 2 years of relevant experience or equivalent combination of education and work experience:
  • Completion of a Bachelor’s degree or equivalent program in Computer Science, Computer Engineering, Electrical Engineering, Network Security, Information Security, Information Technology, or Mathematics.
  •  Completion of an Associate’s degree or equivalent program in Computer Science, Computer Engineering, Electrical Engineering, Network Security, Information Security, Information Technology, or Mathematics and 1 years of work experience in the field.
Additional Information

All your information will be kept confidential according to EEO guidelines.