Truist Financial - Atlanta, GA

posted 4 months ago

Part-time,Full-time - Mid Level
Atlanta, GA
Credit Intermediation and Related Activities

About the position

The Cybersecurity Threat Senior Analyst position within the Security Operations Center is a critical role that supports the Information Security and Cybersecurity Threat Management programs. This position is responsible for responding to cyber incidents and working collaboratively in a multi-team environment. The analyst will process vulnerability and threat data from various internal and external sources to provide actionable intelligence to internal stakeholders. This intelligence is essential for implementing countermeasures and enhancing the defenses of our information systems and resources. The analyst will serve as the first escalation point for security investigations and will provide oversight for tier I analysts in the absence of the manager. Additionally, the analyst will assist principal analysts during incident response activities and cyber investigations. The essential duties of this role include participating in escalated computer security incidents and cybersecurity investigations, which encompass computer forensics, network forensics, root cause analysis, and malware analysis. The analyst will execute appropriate mitigation strategies for identified threats and serve as a coordinator for Tier 1 analysts during escalated cybersecurity threats or incidents. The role also involves creating and maintaining use cases and playbooks for recurring investigation triggers, supporting the 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program. The analyst will interface with other teams within Information Security, such as network operations and vulnerability management, to guide cybersecurity investigations and incidents effectively. Furthermore, the analyst will deliver cyber intelligence services to enterprise technology and business leaders, identify new threat tactics, techniques, and procedures used by cyber threat actors, and participate in threat hunting activities to proactively search for threats within the enterprise environment. The work shift for this position is Sunday to Wednesday, from 7:00 am to 5:00 pm, totaling four 10-hour days.

Responsibilities

  • Participate in escalated computer security incidents and cybersecurity investigations including computer forensics, network forensics, root cause analysis, and malware analysis.
  • Serve as coordinator in the event of escalated cybersecurity threats/incidents for Tier 1 analysts.
  • Participate in the creation and maintenance of use cases for recurring investigation/incident triggers in support of the 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program.
  • Participate in the creation and maintenance of playbooks used in response for investigation/incident triggers in support of 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program.
  • Interface with other teams in Information Security (e.g. network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.
  • Deliver cyber intelligence services and material to enterprise technology and business leaders.
  • Identify new threat tactics, techniques and procedures used by cyber threat actors.
  • Participate in threat hunting activities to proactively search for threats in the enterprise environment.

Requirements

  • Bachelor's degree in Computer Science or related field or equivalent education and related training.
  • Five years of experience in Cybersecurity or related work.
  • Broad knowledge of general IT with a focus area in two or more of the following areas: operating systems, networking, computer programming, web development or database administration.
  • Demonstrated advanced knowledge of cyber security concepts with a focus area in two or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation.

Nice-to-haves

  • Five years of experience in Cybersecurity or related work.
  • Industry certifications in general technology (e.g. Microsoft Certified Professional (MCP), Microsoft Certified Solutions Expert (MCSE), Network+).
  • Industry certifications in cyber security and forensics, such as Certified Ethical Hacker (CEH), GIAC Security Essentials (GSEC), Cisco Certified Network Associate (CCNA), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH).
  • Security Operations Center (SOC) or Network Operations Center (NOC) experience and experience in the Intelligence Community (IC).
  • Demonstrated leadership experience.

Benefits

  • Medical insurance
  • Dental insurance
  • Vision insurance
  • Life insurance
  • Disability insurance
  • Accidental death and dismemberment insurance
  • Tax-preferred savings accounts
  • 401k plan
  • Vacation days (minimum of 10 days)
  • Sick days (minimum of 10 days)
  • Paid holidays
  • Defined benefit pension plan (depending on position and division)
  • Restricted stock units (depending on position and division)
  • Deferred compensation plan (depending on position and division)
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service