Cyber Security Analyst I

$49,691 - $93,870/Yr

Navy Federal Credit Union - Pensacola, FL

posted about 2 months ago

Full-time - Entry Level
Pensacola, FL
Credit Intermediation and Related Activities

About the position

As a Cyber Security Analyst I at Navy Federal Credit Union, you will play a crucial role in monitoring security tools and systems within a 24/7/365 Cyber Security Operations Center. Your primary responsibility will be to provide first-tier response to cyber security incidents, ensuring adherence to standard operating procedures for detecting, classifying, and reporting incidents. You will work under minimal supervision, which requires a strong understanding of cyber security principles and practices. In this position, you will characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. You will coordinate with enterprise-wide cyber defense staff to validate network alerts and document incidents, including their history, status, and potential impact. Your role will also involve performing cyber defense trend analysis and reporting, as well as event correlation using information gathered from various sources to gain situational awareness and assess the effectiveness of observed attacks. Additionally, you will conduct security reviews to identify gaps in security architecture and recommend strategies for risk mitigation. You will be responsible for providing timely detection and alerting of possible attacks, using cyber defense tools for continual monitoring and analysis of system activity. Your analytical skills will be essential in determining tactics, techniques, and procedures (TTPs) for intrusion sets, as well as in isolating and removing malware. You will also assist in constructing signatures for cyber defense network tools in response to new threats, and provide cybersecurity recommendations to leadership based on significant threats and vulnerabilities. Your work will involve collaboration with various stakeholders to resolve computer security incidents and ensure compliance with vulnerability standards. You will also be tasked with performing initial forensic collections and real-time incident handling to support Incident Response Teams (IRTs). This position requires a proactive approach to cyber defense, as you will be expected to track and document incidents from detection through resolution, employing approved defense-in-depth principles and practices.

Responsibilities

  • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
  • Coordinate with enterprise-wide cyber defense staff to validate network alerts
  • Document and escalate incidents that may cause ongoing and immediate impact to the environment
  • Perform cyber defense trend analysis and reporting
  • Perform event correlation using information gathered from a variety of sources within the enterprise
  • Perform security reviews and identify security gaps in security architecture
  • Receive and analyze network alerts from various sources and determine possible causes
  • Provide timely detection, identification, and alerting of possible attacks/intrusions
  • Use cyber defense tools for continual monitoring and analysis of system activity
  • Analyze identified malicious activity to determine weaknesses exploited
  • Determine tactics, techniques, and procedures (TTPs) for intrusion sets
  • Examine network topologies to understand data flows through the network
  • Recommend computing environment vulnerability corrections
  • Conduct research, analysis, and correlation across a wide variety of data sets
  • Validate intrusion detection system (IDS) alerts against network traffic
  • Isolate and remove malware
  • Identify applications and operating systems of a network device based on network traffic
  • Reconstruct a malicious attack or activity based off network traffic
  • Identify network mapping and operating system (OS) fingerprinting activities
  • Assist in the construction of signatures for cyber defense network tools
  • Notify designated managers and cybersecurity service provider team members of suspected cyber incidents
  • Analyze and report organizational security posture trends
  • Assess adequate access controls based on principles of least privilege and need-to-know
  • Monitor external data sources to maintain currency of cyber defense threat condition
  • Assess and monitor cybersecurity related to system implementation and testing practices
  • Provide cybersecurity recommendations to leadership
  • Work with stakeholders to resolve computer security incidents
  • Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans
  • Coordinate and provide expert technical support to cyber defense technicians
  • Correlate incident data to identify specific vulnerabilities
  • Perform analysis of log files from various sources to identify possible threats
  • Perform cyber defense incident triage
  • Perform initial, forensically sound collection of images
  • Perform real-time cyber defense incident handling tasks
  • Track and document cyber defense incidents from initial detection through final resolution
  • Employ approved defense-in-depth principles and practices
  • Collect intrusion artifacts and use discovered data for mitigation
  • Coordinate with intelligence analysts to correlate threat assessment data
  • Write and publish after action reviews
  • Coordinate incident response functions
  • Provide technical summary of findings
  • Coordinate resolution with Tier 2/3 and/or Supervisor for high priority incidents
  • Execute daily adhoc tasks or lead small projects
  • Perform other duties as assigned

Requirements

  • Strong understanding of cyber security principles and practices
  • Experience with network traffic analysis and anomaly detection
  • Familiarity with cyber defense tools and incident response procedures
  • Ability to document and escalate incidents effectively
  • Knowledge of security architecture and risk mitigation strategies
  • Experience in performing trend analysis and reporting in cyber defense
  • Ability to analyze log files from various sources to identify threats
  • Experience with intrusion detection systems (IDS) and packet analysis tools
  • Strong analytical and problem-solving skills
  • Ability to work under minimal supervision and in a team environment

Nice-to-haves

  • Certifications in cybersecurity (e.g., CompTIA Security+, CEH, CISSP)
  • Experience with forensic analysis and incident handling
  • Familiarity with regulatory compliance standards (e.g., NIST, ISO)
  • Knowledge of scripting or programming languages for automation
  • Experience with vulnerability assessment tools

Benefits

  • Competitive hourly wage
  • Comprehensive health insurance
  • 401(k) retirement plan
  • Paid time off and holidays
  • Professional development opportunities
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service