Unfortunately, this job posting is expired.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Some similar recruitments
Senior Security Analyst (Cyberark)
Recruited by Tista Science and Technology Corporation 8 months ago Address , Remote $55,730 - $103,500 a year
Information Security Analyst - 165543
Recruited by Adams County Colorado 8 months ago Address , Brighton $90,754 - $104,367 a year
Information Security Policy Analyst
Recruited by Yum! Brands 8 months ago Address , Remote $82,400 - $106,700 a year
Associate Security Analyst Jobs
Recruited by Press Ganey Associates, Inc. 8 months ago Address , Remote $65,000 - $80,000 a year
It Security Analyst (Remote Or Hybrid)
Recruited by Great West Casualty Company 8 months ago Address Sioux City, IA, United States
Security Program Analyst Ii
Recruited by Akima 8 months ago Address , Rosslyn, 22209, Va
Platform Operations - Analyst / Associate
Recruited by iCapital 10 months ago Address Greater Birmingham, Alabama Area, United States
Information Security Analyst (Usa Remote)
Recruited by PlagScan 11 months ago Address , Remote
Info Security Program Analyst Ii
Recruited by Navy Federal Credit Union 11 months ago Address , Remote $87,800 - $160,900 a year
Principal It Global Egrc Security Analyst (Remote)
Recruited by Zimmer Biomet 11 months ago Address , Remote $125,000 - $150,000 a year
Manager - Information Security (Remote)
Recruited by AmerisourceBergen 11 months ago Address , Remote $115,100 - $177,320 a year
Manager, Information Security Governance (Remote)
Recruited by BCD Travel Corporate 11 months ago Address , Remote
Workday System Security Analyst -Remote
Recruited by MultiCare Health System 11 months ago Address , Remote From $31.47 an hour
Security Analyst Iii (Remote)
Recruited by AmerisourceBergen 11 months ago Address , Remote $93,500 - $143,990 a year
Security Systems Analyst | Remote
Recruited by Dignari 11 months ago Address , Remote
Security Analyst - Business Information Security Office (Remote)
Recruited by Parsons 11 months ago Address , Remote $81,500 - $142,600 a year
Health Information Security Analyst
Recruited by MU Health Care 11 months ago Address , Columbia, 65212, Mo $68,266 - $111,426 a year
Information Security Officer (Remote)
Recruited by Boston Medical Center 11 months ago Address , Remote
Cloud Operations Security Engineer (Remote)
Recruited by Elekta 11 months ago Address , Remote $85,000 - $100,000 a year
Cloud Security Operations Analyst (Remote)
Recruited by Vanguard 11 months ago Address , Remote $100,000 - $180,000 a year
Information Security Analyst Jobs
Recruited by Shipt 11 months ago Address Greater Birmingham, Alabama Area, United States
National Security Systems Analyst
Recruited by Lawrence Livermore National Laboratory 1 year ago Address , Livermore, 94550, Ca $148,650 - $200,328 a year
Associate Analyst, Operations Jobs
Recruited by Nagarro 1 year ago Address , Remote
Cyber Security Analyst Jobs
Recruited by Crown Holdings 1 year ago Address , Tampa, 33601, Fl
Information Security Analyst Ii
Recruited by Navy Federal Credit Union 1 year ago Address , Remote $85,500 - $146,300 a year
Cyber Security Analyst - Rh
Recruited by Reyes Holdings 1 year ago Address , Rosemont, 60018, Il
Information Security Analyst Jobs
Recruited by Capgemini 1 year ago Address , Remote

Security Operations Analyst Ii (Remote)

Company

SWBC

Address , Remote
Employment type FULL_TIME
Salary
Expires 2023-07-21
Posted at 11 months ago
Job Description
SWBC is seeking a talented individual to assist the information security operations team to execute an enterprise-wide security monitoring program and computer security incident response and recovery capability. Assist with maintaining cyber threat situational awareness of internal and external threats and vulnerabilities through enhanced monitoring capabilities and oversight of systems and processes used to assess security. Collects, analyzes, triages, and disposes of information from multiple threat sources to provide near real-time awareness and a common operating view of the environment. Monitors users, applications, networks, systems, and access to physical assets (includes intrusion prevention/detection, email/spam filtering, web filtering). Audits logs (includes review and retention) of applications, networks, systems, and access to physical assets. Scans, analyzes, and disposes of vulnerabilities. Detects, analyzes, and eliminates viruses and malicious code. Accepts, triages, assigns, and disposes of all reported suspicious events and security incidents. Detects, triages, analyzes, responds to, and recovers from suspicious events and security incidents. Uses relevant, meaningful, actionable, and risk-informed metrics to inform management decisions. Conducts physical and logical security control assessments (penetration tests), security monitoring, detection, and security status reporting to enable informed decisions. Develops and refines processes to assure response and recovery actions are timely, efficient, and effective. Leverages exceptional communications skills to inform internal and external stakeholders of cyber threats using written and oral means.
Why you'll love this role:
You will work alongside a team of diverse, friendly and mentoring IT security professionals within an enterprise-level environment to monitor, collect and analyze external and internal cyber threats using security control tools and assessments.
Essential duties include the following:
  • Supports organizational activities and readiness by incorporating lessons learned from current and previous detection/response activities.
  • Determines the impact of events and recommends incident alter thresholds.
  • Monitors programs and processes to quickly detect, respond, and resolve computer security incidents to protect SWBC-owned or controlled information and information systems within a heterogeneous technology environment.
  • Tests and continually improves detection processes. Communicates detection information to appropriate parties.
  • Helps educate and train personnel on their role and order of operations when a response is needed. Drafts reports of events following internal and external requirements.
  • Supports changes to recovery planning and processes by incorporating lessons learned into future activities.
  • Facilities forensics services through third party agreement. Evaluates incidents consistent with response plans.
  • Supports mitigation activities to prevent expansion of an event, mitigate its effects, and eradicate the incident. Contains and mitigates incidents.
  • Supports restoration activities with internal and external parties, such as coordinating centers, Internet Service Providers, owners of attacking systems, victims, other CSIRTs, and vendors.
  • Monitors information systems and assets at discrete intervals to identify cyber security threats and events and verify the effectiveness of protective measures.
  • Promotes situational threat awareness by executing voluntary information exchanges with external stakeholders.
  • Supports efforts to manage public relations and repair company reputation after an event with internal partners.
  • Monitors systems and supports processes to detect anomalies and events in a timely manner and ensures the potential impact of events is understood by stakeholders.
  • Maintains and tests detection processes and procedures to ensure timely and adequate awareness of anomalous events.
  • Supports response activities with internal and external stakeholders, as appropriate, to include external support from law enforcement agencies.
  • Helps establishes a baseline of network operations and expected data flows for users and systems. Analyzes detected events to understand attack target and methods.
  • Provides continuous security monitoring, detection, and incident response and recovery.
  • Monitors systems to detect malicious and unauthorized mobile code.
  • Evaluates lessons learned and recommends updates to response strategies.
  • Supports information sharing consistent with incident response plans and coordinates stakeholders as necessary.
  • Executes recovery processes and procedures to ensure timely restoration of systems or assets affected by cyber security events. Executes recovery plan during or after an event.
  • Monitors environments for unauthorized personnel, connections, devices, and software. Performs vulnerability scans and provide information for remediation.
  • Conducts analysis to ensure adequate response and support recovery activities. Investigates notifications from detection systems and assesses impact of incident.
  • Performs other duties as required.
  • Monitors network, personnel, external service providers, and the company’s physical environment to detect potential cyber security events.
  • Supports efforts to develop communications for internal stakeholders and executive and management teams during recovery operations.
  • Aggregates and correlates event data from multiple sources and sensors.
  • Documents or mitigates newly identified vulnerabilities.
  • Incorporates lessons learned into recovery plans and updates strategies
  • Tests, maintains, and executes response processes and procedures to ensure timely response to detected cyber security events. Executes incident response plans during or after an event.
Serious candidates will possess the minimum qualifications:
  • Bachelor’s Degree in Information Systems, Computer Science, Cyber security, or related.
  • Experience using vulnerability assessment tools required.
  • Experience using Splunk, Splunk Enterprise Security (ES), and other Security Information and Event Management (SIEM) tools.
  • Current ITILv3 Foundation and GIAC-GCIH certifications or be able to obtain within one (1) year.
  • Working knowledge of tactics, techniques, and procedures for log analysis.
  • Able to travel locally and nationally.
  • Able to lift 10-20lbs.
  • Proficient with MS Word and Excel.
  • Experience with incident response procedures from preparation to recovery.
  • Working knowledge of Security+ CE or SSCP certification desired.
  • Demonstrated excellent written and verbal communication skills and ability to work with teams and external stakeholders.
  • Minimum two (2) years Intrusion detection, incident response, security monitoring, and vulnerability management.
  • Able to use personal computer, general office equipment including copy machine and phone system.
SWBC offers*:
  • Career enhancement and growth opportunities
  • Years of Service awards
  • Employee engagement activities and recognition awards
  • Lucrative Wellness Program
  • Work/Life balance
  • Continuing education and career certifications
  • Variety of healthcare coverage options
  • Emerging Professionals and Mentor Program
  • Traditional and Roth 401(k) retirement plans
  • Competitive overall compensation package
  • Based upon employee eligibility

Additional Information:

SWBC is a Substance-Free Workplace and requires pre-employment drug testing.

Please note, SWBC does not hire tobacco users as allowed by law.

To learn more about SWBC, visit our website at www.SWBC.com. If interested, please click the appropriate apply button.