Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Truist Cybersecurity Threat Sr Analyst - Security Operations Center 
United States, Georgia, Atlanta 
825252173

11.08.2024

Regular or Temporary:

English (Required)

1st shift (United States of America)

Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

1. Participate in escalated computer security incidents and cybersecurity investigations including computer forensics, network forensics, root cause analysis and malware analysis and execute on appropriate mitigation strategies for identified threats.

2. Serve as coordinator in the event of escalated cybersecurity threats/incidents for Tier 1 analysts.

3. Participate in the creation and maintenance of use cases for recurring investigation/incident triggers in support of the 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program.

4. Participate in the creation and maintenance of playbooks used in response for investigation/incident triggers in support of 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program.

5. Interface with other teams in Information Security (e.g. network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.

6. Deliver cyber intelligence services and material to enterprise technology and business leaders.

7. Identify new threat tactics, techniques and procedures used by cyber threat actors.

8. Participate in threat hunting activities to proactively search for threats in the enterprise environment.

***Work shift would be Sunday - Wednesday, 7:00 am - 5:00 pm***
(four 10 hour days)


Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

1. Bachelor’s degree in Computer Science or related field or equivalent education and related training

2. Five years of experience in Cybersecurity or related work

3. Broad knowledge of general IT with a focus area in two or more of the following areas: operating systems, networking, computer programing, web development or database administration 4. Demonstrated advanced knowledge of cyber security concepts with a focus area in two or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation

Preferred Qualifications:

1. Five years of experience

2. Industry certifications in general technology (e.g. Microsoft Certified Professional (MCP), Microsoft Certified Solutions Expert (MCSE), Network+)

3. Industry certifications in cyber security and forensics, such as Certified Ethical Hacker (CEH), GIAC Security Essentials (GSEC), Cisco Certified Network Associate (CCNA), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Ha Industry certifications in general technology (e.g. Microsoft Certified Professional (MCP), Microsoft Certified Solutions Expert (MCSE), Network+)

4. Security Operations Center (SOC) or Network Operations Center (NOC) experience and experience in the Intelligence Community (IC)

3. Demonstrated leadership experience

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need