Job Description :
Information Security Analyst

This position will be providing security services to our national and global business units, monitoring for, triaging and analyzing malicious activity from threat actors from both external and internal to the organization. The positon will provide a cyber security focus on Company Assets, Intellectual Property, and Business relationships. We are looking for a Subject Matter Expert (SME) with several years of experience in identifying and defending against such threats from malicious actors. This position will put the qualified candidate in a position to globally interact with risk leaders for our business units.

Responsibilities •Develops & executes security controls, defenses & counter measures to intercept & prevent internal/external attacks or attempts to infiltrate company systems.
Researches attempted and/or successful efforts to compromise systems security & designs countermeasures.
The candidate will be working with our first line of defense (Level 1 and 2) analysts to accept escalated events and incidents to conduct deep dive investigation.
Ability to examine and understand threats at the packet level, in various applications, and databases as well as an understanding of how the technologies communicate.
Performing malware and forensic analysis including memory capture and analysis.
Monitors, maintains & provisions h/w, s/w, network firewalls or other security devices, & encryption systems including key management & encryption s/w.
Administers security policies to control physical & virtual access to systems, encryption of sensitive & confidential data, software patching, security penetration tests & other policies enforced by infrastructure components.
Provides input to management on the acquisition of the new h/w and/or s/w required to meet new regulatory functions or to handle the expected load increases.
Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration, or denial of access to information.
Understanding of Info Security Compliance, Design & Administration
Monitors security toolsets & administers information security processes & policies
Completes customer & vendor assurance projects. Assist End Users with issues related to security products.
Works with systems or applications teams to understand compliance requirements.
Coordinates & analyzes compliance with regulations
Analyzes emerging technology trends with security vendors & SME's.
Ability to design & architect new information security infrastructure solutions.
Designs and/or adapts security policies.
Proactively hunt for and research potential malicious activity and incidents across multiple platforms using advanced threat network and host-based tools
Use both internal and external threat intelligence to build indicators of compromise into monitoring tools
Use strong TCP/IP networking skills to perform network analysis to isolate and diagnose potential threats and anomalous network behavior
Document actions in cases to effectively communicate status and outcomes
Report common and repeated problems (trend analysis) to management and propose process and technical improvements
Provide resolution plans for system and network issues
Provide support in the detection, response, mitigation and reporting of real or potential cyber threats to the environment
Identify security goals, objectives and requirements for continuous improvement of services
Maintain and employ a strong understanding of advanced threats, continuous vulnerability assessment, response and mitigation strategies used in cybersecurity operations
Maintain, monitor and investigate audit logs with a strong ability to perform in-depth security forensics to effectively identify and manage suspicious activity
Provide written and verbal reports and updates to customers/business units
Leadership role in providing ongoing knowledge transfer to junior analysts
Develop and maintain up to date Run-Books and/or Standard Operation Procedures to maintain relevancy, address current/emerging threats and technology, and ensure constant improvement that meet industry standards and emerging attacks and threats.
Create and Follow Use Cases for alerts for security events
Minimum Requirements•Senior level experience in administering security controls in an organization and/or working in a Security Operations Center doing End-Point Security Controls.
Critical Skills •Experience with the following toolsets:
Client/McAfee EPO/End Point Security Suite
SIEM - SPLUNK
Mac Support/CASPER
SIEM - Nitro
Bright Point
StealthWatch
BlueCoat/Zscaler/CASB
SiteAdvisor
Data Loss Prevention
CyberArk
Next-Gen End Point
RSA/SBR/SecurePulse
Tanium
Log Binder/SharePoint
Securonix/UEBA
SMFTP
Automation
Python
Powershell
PAN
WildFire
IPS/IDS
Encase/FTK
Malware analysis experience
Experience with Remedy/ServiceNow/JIRA
Experience with Archer
Excellent communication and customer service skills with references
Experience with process documentation
Additional Knowledge & Skills •Applies knowledge in order to support a product
Basic & expanding knowledge of networking, database design, programming & scripting.
Expanding knowledge of product, platforms, systems, and/or processes supported
Working knowledge of standards & information security policies in own area.
Basic knowledge of one or more security domains
Education •4-year degree in computer science or related field or equivalent experience
CEH, SEC+, CISSP a plus