Home

Looking for Cyber Security Analyst at Remote, Remote, USA
Email: [email protected]
From:

Sushmita Soni,

Sonitalent

[email protected]

Reply to:   [email protected]

Hi

Hope you are doing well,

We are looking for Cyber Security Analyst,

please let me know if you are looking for this role and send me your updated resume also

Cyber Security Analyst

CONTRACT TO HIRE

The best way to get me to consider your candidate is by reading and following these directions

      -

MUST HAVES:

Professional IT Security certifications such as CySA+, CISSP, CISM, CISA, CRISC

Completed at least one system migration to Cloud

Working knowledge of Active Directory, Tools for monitoring trends related to Security Event Management, Vulnerability Assessment, Intrusion Detection; O365; Azure, SSO

Understanding of SIEM, AV/patch/vulnerability management, and CIS hardening

Official Job Description



JOB SUMMARY

The primary role of the Cyber Security Analyst  is to support the Information Security Officer (ISO) with maintaining the healthy cybersecurity posture of the company by focusing upon adhering with the FFIEC Cybersecurity Assessment Tool (CAT).  The objectives are enforcement and monitoring of user/data/system security and integrity in accordance with the Corporate Information Security Policy along with legal and regulatory compliance and recognized standards from International Standards Organization (ISO), National Institute of Standards and Technology (NIST) and Center for Internet Security (CIS).  The Analyst also contributes materials and time on activities involving audits, examination, and testing of IT/IS/Cybersecurity controls and design. 

PRINCIPAL RESPONSIBILITIES AND DUTIES

SECURITY MONITORING/AUDIT

  Monitoring of information security and cybersecurity is to occur daily.  Documented procedures and checklists are used to base the completion of routines associated with continuous monitoring functions.  The Analyst is responsible to ensure that monitoring is sufficiently robust to reduce risk.  Duties include policies configuration, software inventory oversight, malware defense checks, threat insight, and outsourced services oversight.  Adhere with CAT declarative statements up to the Banks maturity level relevant to this task.

APPLICATION SYSTEMS SECURITY

  The Analyst will verify appropriate security is applied to shared applications maintained at the Bank.  Access rights are applied based on need, information sensitivity, information integrity, and resource management.  Policies are maintained that define the standard methods of security implementation for applications.  Documentation is developed for non-standard implementation or when inaccessible from the application.  Duties include the support and testing, commenting on change control items reviewed in the Change Advisory Board of new or changed security functionality within the applications under review and the random certifications, audit & monitoring of users to oversee appropriate use principles are adhered with.

THREAT INTELLIGENCE/PROFILING

  The Analyst will participate actively in forums to acquire threat intelligence and apply insights to profiling their probability of relevance with posing a cybersecurity risk for the Bank.  Utilize insight with tactics, techniques, and procedures (TTPs) from MITRE Attack Framework as applicable.  Engage during vendor selection, testing and remediation phases of the annual penetration exercise.  Assess penetration test engagement scope and results.  Contribute to remedial actions on findings reported.  Adhere with CAT declarative statements for this domain in accordance with the Banks maturity level.

THREAT MANAGEMENT TOOLS

  The Analyst will conduct audits whose frequency is risk-based.  The reviews of multiple tools implemented to establish the presence of insider threat, endpoint threat, network access control, vulnerabilities exploitation, or anomalous actions.  Adhere with CAT declarative statements for the controls domain in accordance with the Banks maturity level.

BUSINESS CONTINUITY/DISASTER RECOVERY/INCIDENT RESPONSE

  The Anlayst supports the maintenance of policies, procedures, and guidelines for information systems incident response and contingency plans.  Responsibilities also include the contribution with any aspect of disaster recovery and/or incident response as part of a test or in the event of an actual disaster or incident starting with the alert/notification phase through the return to home site or recovery/resiliency of impacted system/service.

TRAINING

  Train team members as needed to ensure continuity and succession.  Assist with integration by colleagues of security tools post implementation.  Share best practices with team members to have synergy and efficiency on joint or common tasks. 

PROCEDURE ADMINISTRATION

  Procedures for appropriate and relevant assignments are created and maintained by the Analsyt in a central location.  Final procedures require the approval of the ISO.

OTHER DUTIES  

Manage projects as assigned in conjunction with technology transformation initiatives, target operating model such as Identity Access Management, Network Segmentation, DNSSEC, and more in the IT/IS roadmap.

JOB SPECIFICATIONS

Education:

                 Associates Degree in Business Administration or Computer Science. (Nice to have but not a must have)

Experience:

               Minimum 3-4 years work experience in Information Security preferred; experience in Information Technology or Banking Industry helpful.  Systems Administrator experience of 3

rd

 party applications.

Skills/Qualifications:          

Ability to work with confidential information and volumes of detail;

Ability to intuitively and independently audit, analyze, organize tasks and projects;

Experience in information security, computer analytics, testing and techniques.

Understanding of SIEM, AV/patch/vulnerability management, and CIS hardening.

Ability to identify and mitigate security vulnerabilities by implementing defense tactics.

Working knowledge of Active Directory, Tools for monitoring trends related to Security Event Management, Vulnerability Assessment, Intrusion Detection; O365; Azure, SSO.

Experience with developing written technical procedures that are user-friendly;

Effective oral and written communication skills; presentation experience desired.

Ability to work in a team-oriented environment;

Experience using industry frameworks such as FFIEC CAT, NIST, 
COBIT, ISO.- Are a plus

Thanks & Regards

Sushmita Soni

Sr. Technical Recruiter| SoniTalent Corp.

Desk | 859-659-1004   EXT 201

[email protected]

Address

5404 Merribrook Lane, Prospect, KY, USA

Keywords: information technology Kentucky
[email protected]
View all
Thu Sep 07 01:51:00 UTC 2023

To remove this job post send "job_kill 609200" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 1

Location: ,