掲載日 ・ 2025/09/04
楽天グループ株式会社
楽天グループ株式会社:1025871 Cyber Security Analyst – Rakuten-CERT Section, Cyber Security Defense Department (CSDD)
非公開
東京都
会社名
楽天グループ株式会社
会社概要
未来を信じ、より良い明日を創っていく。
イノベーションを通じて、人々と社会をエンパワーメントする。私たちは、そんな想いを大切に世界の人々に喜びと楽しさを届けます。
楽天は、E コマース、FinTech、デジタルコンテンツ、通信など、70 を超えるサービスを展開し、世界10 億以上のユーザーに利用されています。
これら様々なサービスを、楽天会員を中心としたメンバーシップを軸に有機的に結び付け、他にはない独自の「楽天エコシステム」を形成しています。ダイバーシティ推進は、楽天にとって最優先の企業戦略のひとつです。従業員の出身は70カ国・地域以上。世界中からユニークで多様な文化的背景や視点を持つ優秀な人材が集まり、イノベーションの原動力になっています。社内カフェテリアにはベジタリアン、ハラル対応のメニューを用意。礼拝所(Prayer room)もあります。
また、仕事と育児の両立支援や、障がい者雇用・活躍促進も積極的に推進。社内のLGBT(※1)当事者やアライ(※2)に対して、情報共有やサポート体制の強化も進めています。誰もが自分らしく力を最大限発揮して働ける。それが楽天のダイバーシティです。
70を超えるサービスを提供し、世界30カ国にサービス展開拠点を持ち、従業員の出身国・地域数は100を超え、オープンポジション制度を活用して多様なキャリアを描くことができる点も魅力です。
フレックスタイム制度、事情に応じたリモートワークの活用が可能です。本社には託児所やフィットネスジム、三食無料で利用可能なカフェテリアが併設されるなど、社員を支える環境が整備されています。
ポジション
1025871 Cyber Security Analyst - Rakuten-CERT Section, Cyber Security Defense Department (CSDD)
仕事内容
Job Description:
Department Overview
In 'Rakuten Group, Inc. security and safety of the internet services are guaranteed by Cyber Security Defense Department (CSDD), the core of Rakuten-CERT. Rakuten Security Team has been fighting against various cyber threats, and Cyber Threat Intelligence Team is in charge of Threat Intelligence activities for Rakuten group companies and we're looking for Threat Intelligence Analyst.
Position:
Position Details
- Lead and coordinate the response to cybersecurity incidents, including detection, containment, eradication, and recovery, while ensuring clear communication and collaboration across teams.
- Analyze logs from various sources (e.g., firewalls, SIEM, IDS/IPS, endpoint detection tools) to identify threats, investigate anomalies, and determine the scope and impact of incidents.
- Perform digital forensic investigations on compromised systems, including memory dumps, disk images, and network traffic, while preserving evidence in accordance with legal and organizational requirements.
- Use tools to quickly analyze malicious files, scripts, and executables to identify indicators of compromise (IOCs) and take necessary actions for containment, blocking, and mitigation.
- Prepare detailed incident reports, including root cause analysis, impact assessments, and recommendations for improvement, and communicate findings to stakeholders, including technical teams and management.
- Proactively identify and recommend improvements to security controls, processes, and tools to reduce the likelihood of future incidents, and conduct threat hunting activities to mitigate risks.
- Provide guidance and training to internal teams on incident response best practices and stay up-to-date with the latest cybersecurity trends, tools, and techniques.
求める経験・スキル
Mandatory Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field (or equivalent experience). - 3+ years of experience in cybersecurity, with a focus on incident response, digital forensics, or threat detection.
- Strong knowledge of security tools and technologies, such as SIEM, EDR, IDS/IPS, firewalls, and vulnerability scanners.
- Proficiency in log analysis and familiarity with log formats (e.g., syslog, Windows Event Logs).
- Hands-on experience with Incident Response (IR) processes and methodologies.
- Familiarity with scripting and automation (e.g., Python, PowerShell, Bash) to streamline incident response processes.
- Strong sense of ownership and responsibility.
- Excellent problem-solving, analytical, and communication skills.
- Ability to work under pressure and handle multiple incidents simultaneously.
Desired Qualifications:
- Relevant certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), or Certified Ethical Hacker (CEH).
- Experience handling escalated cases from a Security Operations Center (SOC).
- Hands-on experience with forensic tools (e.g., EnCase, FTK, Volatility) and malware analysis tools (e.g., Cuckoo Sandbox, VirusTotal).
- Experience with cloud security and incident response in cloud environments (e.g., AWS, Azure, Google Cloud).
- Knowledge of MITRE ATT&CK framework and its application in threat detection and response.
- Ability to communicate in Japanese.