Finding the best job has never been easier
Share
The Security Operations Center (SOC) Cyber Threat Analyst will be part of the SOC Team. This center monitors analyses and responds to infrastructure threats and vulnerabilities on a 24x7 basis. SOC Analysts are responsible for performing the day-to-day monitoring of Citi's environment analyzing responding to events as necessary and providing technical support. These operations are critical since they provide Citi's first line of defense against infrastructure attacks.Responsibilities:
Perform security monitoring, assessment and analysis on events generated by Intrusion Detection/Prevention tools, anomaly detection systems, antivirus and EDR systems, email security gateway, proxy devices, cloud security solution, data leakage prevention system via SIEM which requires demonstrable security incident response experience
Assess and investigate potential security threats sourced from other channel leveraging variety of data and tools
Drive a continuous effort to improve SOC process. Execute adhoc tasks or small projects as needed.
Undertakes root cause analysis of events, perform risk assessment on threat or vulnerability and make recommendations to improve detection capability
Drive a continuous effort to review and fine tune detection rule/use case/signature to reduce unnecessary noise and increase alert fidelity
Handle threat incidents calls like DDOS incidents, adhoc high severity cases including collaboration and escalation to other support groups
Participate in daily and adhoc conference calls, self-assessment processes and documentation related tasks
Qualifications:
4-8 years of relevant experience
Consistently demonstrates clear and concise written and verbal communication
Proven influencing and relationship management skills
Understand the life cycle of network threats, web attacks, attack vectors, and methods of exploitation to conduct analysis across packet captures, network traffic, web logs, endpoint logs and others to identify unusual behavior that may indicate malicious activity
Proven and strong analytical skills
Attentive to detail and possess a strong investigative mindset
A good team player, self driven and able to act as individual contributor
Consistently demonstrates clear and concise written and verbal communication
Relevant cyber security certification is a bonus
Education:
Bachelor’s degree/University degree or equivalent experience
This job description provides a high-level review of the types of work performed. Other job-related duties may be assigned as required.
Regular weekly work shift will include one of the weekends (e,g, Saturday, Sunday).
Information Security
Time Type:
View the " " poster. View the .
View the .
View the
These jobs might be a good fit