Lincoln Financial Group - Radnor, PA

posted 27 days ago

Full-time - Mid Level
Remote - Radnor, PA
Securities, Commodity Contracts, and Other Financial Investments and Related Activities

About the position

The IT Security Incident Response Analyst position at Lincoln Financial is a critical role focused on the continuous monitoring and investigation of security alerts. The analyst will be responsible for maintaining the health of security sensors and endpoints, collecting necessary data and context to initiate incident response (IR). This position requires a proactive approach to security, as the analyst will correlate and triage security events generated by monitoring tools to assess their scope, urgency, and potential impact. The role involves documenting incidents from initial detection through to final resolution, ensuring a thorough record of security events. In addition to incident documentation, the analyst will perform various incident response functions, including host-based analysis on Windows, Linux, and Mac OS X systems to identify suspicious and malicious activities. A strong understanding of operating systems and their artifacts is essential for assisting in investigations. The analyst will also analyze different data types from various sources within the enterprise to draw conclusions regarding past and potential current security incidents. The role includes providing after-hours support on a rotational basis to address critical incidents and maintain continuous coverage. The analyst will engage in threat hunting exercises to proactively discover threats that may evade existing security mechanisms, using this information to enhance the organization’s cyber resilience. Furthermore, the analyst will create and modify Security Information and Event Management (SIEM) dashboards to effectively monitor activity and tune security tool policies to reduce false positives and improve detection capabilities.

Responsibilities

  • Continuously monitor the alert queue and investigate security alerts.
  • Monitor the health of security sensors and endpoints.
  • Collect data and context necessary to initiate incident response.
  • Correlate and triage security events generated by monitoring tools to determine scope, urgency, and potential impact.
  • Document incidents from initial detection through final resolution.
  • Perform incident response functions, including host-based analysis on Windows, Linux, and Mac OS X systems.
  • Maintain expertise in operating systems to assist in investigations.
  • Analyze different data types from various sources to draw conclusions regarding security incidents.
  • Provide after-hours support as required to address critical incidents.
  • Perform threat hunting exercises to discover current or historical threats.
  • Create and modify SIEM dashboards to monitor activity.
  • Tune and maintain security tool policies to improve detection capabilities.

Requirements

  • 3 - 5+ years of experience with Endpoint Detection and Response (EDR/XDR) and/or DFIR open-source tools (e.g., Kape, Plaso Log2Timeline, Autopsy).
  • 3 - 5+ years of information security experience in areas such as security operations, incident analysis, incident handling, and vulnerability management.
  • Bachelor's degree or equivalent work experience.

Benefits

  • Clearly defined career tracks and job levels.
  • Leadership development and virtual training opportunities.
  • PTO/parental leave.
  • Competitive 401K and employee benefits.
  • Free financial counseling, health coaching, and employee assistance program.
  • Tuition assistance program.
  • Remote work environment and flexible work hybrid situations.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service