Considering COVID-19, we are still hiring but conducting virtual interviews to keep our candidates and employees safe. Many roles will be temporarily remote or work from home to comply with current safety regulations. These roles will be required to be in the office once it is safe or restrictions are lifted. Read more on our response here: Teradata Response to COVID-19
With all the investments made in analytics, it’s time to stop buying into partial solutions that overpromise and underdeliver. It’s time to invest in answers. Only Teradata leverages all of the data, all of the time, so that customers can analyze anything, deploy anywhere, and deliver analytics that matter most to them. And we do it at scale, on-premises, in the Cloud, or anywhere in between.
We call this Pervasive Data Intelligence. It’s the answer to the complexity, cost, and inadequacy of today’s analytics. And it's the way Teradata transforms how businesses work and people live through the power of data throughout the world. Join us and help create the era of Pervasive Data Intelligence.
The Information Security Analyst will be tasked not only with identifying and responding to potential threats, but also proactively hunting and eliminating them. The ideal candidate will have highly technical skills and should possess an understanding across a broad range of security technologies and will take a proactive approach to network intrusions. You should have several years of experience working within a SOC environment and should have hands-on experience in creating and executing cyber hunting missions. The candidate must be a world-class problem-solver with the ability to handle challenges under pressure. This is a global role with responsibility for Teradata security technologies for all business units.
The ideal candidate will have experience and a proven track record of finding and responding to threats found from various tools DLP, SIEM. Security Analytics, Behavior Analysis etc. As a key member of the security team, flexibility and a broad knowledge of security processes, along with strong communication and collaboration skills, will result in a successful candidate.
Key Areas of Responsibility
Direct hands-on expertise in the following areas of information security