Position Summary The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
- Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
- Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
- Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
- Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
- Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
- Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
- Document and perform verification of IT related changes in accordance with Company security policies and procedures.
- Research and recommend hardware and software solutions to augment or enhance existing security measures.
- Stay current in events and trends in IT security.
- Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
- Conduct scheduled reviews of key application security settings.
- Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
- Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
- Supports audit and incident processes, as required
- Monitor and support internal SEIM systems, reports, and searches
- Monitor and support internal phishing email report systems and reports
- Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
- Develops strong liaison relationships with key internal business and technology teams
- Coach level I & IIs on security domains and program processes
- Depending on need, VP Security may determine a Team Lead designation for Level III role
- Participate in security work streams for a variety of enterprise projects and initiatives
- Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
- Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
- Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
- Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
- Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
- Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
- Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
- Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
- Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
- Familiarity with cloud architectures, security standards, and best practices
- Strong oral and written communication skills
- Strong organizational skills and attention to detail
- Excellent interpersonal skills
Ability to:
- Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
- Take independent action within established options and develops new procedures and approaches to problems when necessary
- Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
- Self-starter requiring minimal supervision
- Highly organized and efficient.
- Demonstrated strategic and tactical thinking.
- Stays current with the evolving threat landscape.
- Perform duties and make decisions under frequent time pressures
Education and Training:
- (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
- On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
- Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
- At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
- Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance. (Base Pay Range: $86,000 - $123,000/year) Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information. Equal Opportunity Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment. Unsolicited Resumes Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
|