מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר
Job Description:
This job is responsible for supporting evaluations of cyber security threats and updating defensive capabilities to reduce the bank's risk of exposure. Key responsibilities include conducting analyses of the threat environment and threats to the bank, including post incident analysis, applying a multi-faceted situational awareness of cyber security processes to protect against threats, and implementing proactive defensive actions for the security, continuity, and confidentiality of information.
The Identity Defense Specialist will support design efforts to build out new processes, controls, and supporting governance related to implementation of human and non-human account monitoring to protect the Bank. You will utilize in-depth technical knowledge and business requirements to help implement scalable solutions, inclusive of monitoring, alerting, and escalation frameworks focused on core account protections. Leveraging your knowledge of both common and emerging threats related to account take-over, you will have an opportunity to proactively develop, implement, and influence controls and policy within the digital identity domain. You will partner with leaders from line of business organizations to triage security events and report on impacting security incidents.
Responsibilities include, but are not limited to:
Actively investigate alerts related to potentially anomalous behavior/activity.
Confidently and professionally interview/question users to determine or confirm root cause.
Communicate effectively with response and business partners.
Build and monitor Splunk alerting and dashboards.
Identify areas for further process automation, simplification, and improvement.
Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.
Risk management.
Comprehensively document analysis, investigative activities, actions, etc.
Ability to work non-standard hours, to include occasional on-call time during nights, weekends, and holidays.
Required Qualifications:
3 + years of experience with Information Security related activities.
2 + years of experience in an operations focused information security role.
Experience conducting analysis/investigation and containment of potential data breaches or cyber security incidents.
Ability to analyze data and evaluate relevance to a specific incident under investigation.
Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.
Ability to exercise independent judgment when responding to alerts.
Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.
Familiarity with security vulnerabilities exploits and hacker techniques.
Desired Qualifications:
Familiarity identity management standards, social engineering TTPs, and the incident response lifecycle.
Familiarity with Splunk, and the ability to build queries, alerts, dashboards, etc.
Knowledgeable of current authentication-based exploits.
Proven experience presenting findings via written reports and orally to key stakeholders in clear and concise language.
Supportive and can work well as part of a team as well as independently.
Can remain calm under pressure.
Ability to work in a strong team-orientated environment with a sense of urgency and resilience.
Critical thinking - must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks while remaining risk and objective focused.
The candidate selected for this role will be required to secure a Security+, GSEC, GCIH or equivalent certification within 6 months of hire
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
משרות נוספות שיכולות לעניין אותך