Associate Analyst, Security in Grapevine, TX at GameStop

Date Posted: 10/1/2019

Job Snapshot

Job Description


Working with general supervision, the Security Associate Analyst will primarily spend most of their time analyzing attacks escalated from the Tier 1 SOC group, determine how it got through, and what actions are required. Associate may interact with his or her supervisor several times a week, perhaps daily, to receive guidance and feedback. Some non-routine activities may require a supervisor’s advance approval.


  • Performing technical root cause analysis, limited forensic investigations, and respond based on priority and business impact.
  • Perform remediation and research attack patterns using a variety of security tools.
  • Perform escalations to the appropriate tier 3 response team and/or security engineering team.
  • Work with threat intelligence feeds and other sources to perform threat hunting throughout the GME environment
  • Create rules, filters, active channels, queries, trends and all other informational content based on use cases
  • Communicate and collaborate with security operations center analysts to optimize SIEM performance to better meet the needs of operations
  • Tune correlation rules and event data quality to maximize SIEM system efficiency
  • Provide support, recommendations and optimization for the SIEM platform
  • Event monitoring, correlation, event analysis, investigation and remediation of security events.
  • Collaborate effectively with local team members and offshore staff to create ‘best practice’ processes
  • TCP/IP networking  for performing network troubleshooting to isolate and diagnose common network problems
  • SIEM administration tasks including troubleshooting of various SIEM components
  • Interface with onsite and remote GME customers as needed to resolve security incidents


  • Quality Orientation – Accomplishes tasks by considering all areas involved, no matter how small; showing concern for all aspects of the job; accurately checks processes and tasks; being watchful over a period of time
  • Creating a Service Reputation —  Modeling for others service behaviors that meet customers’ and own organization’s needs; using appropriate interpersonal styles and techniques to resolve difficult customer situations and to retain customer confidence
  • Managing Work – Ensures that required equipment and materials are in appropriate location so that own and others’ work can be done effectively; effectively allocates own time to complete work; takes advantage of individuals, processes, departments, and tools to complete work efficiently; uses time effectively and prevents irrelevant issues or distractions from interfering with completing work
  • Planning and Organizing –   Establishing courses of action for self and others to ensure that work is completed efficiently


  • Associate degree or equivalent certificate in Information Technology, Computer Systems, or other related field
  • Previous experience as a SOC Level 1 analyst or equivalent
  • CISSP / CISA / CEH / OSCP or other information security certifications preferred


  • Proficient ability to resolve problems independently and understand the escalation procedure
  • Proficient knowledge of TCP/IP protocols and analysis
  • Knowledge and experience in security products such as Firewalls, DLP, and next gen devices is added plus
  • Relevant professional experience including working knowledge or high-level awareness of the following technologies:

-Log Management and SIEM (e.g. Splunk, IBM QRadar, etc.)

-Firewalls (e.g. PaloAlto Networks, Cisco ASA, Juniper SSG, etc.)

-Routers (e.g. Cisco, Juniper, etc.)

-Network Analysis Tools (e.g. Netwitness, Wireshark, etc.)

-System Analysis and Forensic Tools (e.g. FTK, EnCase, etc.)

-Endpoint Security (e.g. Bit9, Carbon Black, Symantec, McAfee, Forefront, etc.)

-Windows Management (e.g. WSUS, SCCM, SCOM, Active Directory, Group Policy Objects, etc.)

-Vulnerability Management (e.g. NeXpose, Tenable Nessus, etc.)

-Penetration Testing Tools (e.g. Kali, Metasploit, etc.)

-Operating Systems (e.g. Windows Server 2008/2012, Red Hat or other variations of Linux, OSX, etc.)

-Enterprise Microsoft Solutions (e.g. Exchange, Sharepoint, Lync, etc.)

-Regulatory Regimes (e.g. ISO27K, SSAE16, HIPPA, PCI, FISMA, etc.)

-Internet Policy Enforcement, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) solutions

  • Consistently demonstrates a commitment to GameStop policies and procedures, including but not limited to, attendance, confidentiality, conflict of interest, and ethical responsibilities
  • Proficient ability to organize, prioritize and control job responsibilities to meet deadlines in an environment with overlapping and potentially conflicting priorities
  • Proficient ability to remain flexible and adapt to changing priorities with promptness, efficiency and ease
  • Working typing and data entry skills
  • Proficient ability to work with confidential documents and maintain their confidentiality
  • Proficient ability to communicate effectively with others using spoken and written English Proficient ability to
  • Consistently demonstrates a commitment to GameStop policies and procedures, including but not limited to, attendance, confidentiality, conflict of interest, and ethical responsibilities