You have an innovative mindset. Not afraid to ask why and question established practices, always looking to own and improve quality via automation and tooling.
You have strong analytical skills required to identify threats, vulnerabilities, and exploitations.
You are broadly skilled who can pick up new technologies and concepts and apply them to your day-to-day work. You should understand the industry leading Data Loss Prevention tools and technologies.
You are a good team player and willing to actively participate in team discussions and knowledge-sharing.
You can demonstrate a problem-solving mindset with intellectual curiosity, critical thinking, and proactive solutions.
You are willing to work weekend (Saturday and Sunday) on a rotational shift basis.
You are willing to be enrolled into the bank’s Associate Investment Monitoring Program.
What you can expect
Candidate must be willing to enroll in Associate Investment Monitoring due to the nature of the role and access.
What you will do
Daily analysis of Internet monitoring alerts accurately within the defined business SLA Identify and escalate risk according to standard operation procedures.
Willingness to actively participate in team discussions and knowledge-sharing
Analyze events/metrics and escalation data, identify patterns and trends on high-risk controls and proactively suggest, develop, and implement enhancements to reduce risk.
Self-starter with an ability to navigate and collaborate effectively within a geographically complex and dispersed global corporation.
Basic understanding of networking systems, security vulnerabilities, exploits and attacks.
Strong communications both written and verbal with the ability to present control topics to a broad audience.
Willing to work weekend on a rotational shift basis.
Perform real-time analysis and trending of security log data from various security devices and systems.
Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
Respond to user incident reports and evaluates the type and severity of security events.
Execute initial triage of incidents to rule out false positives.
Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
Interpret and apply security policies and procedures.
Establish escalation processes for security incidents and develops contingency plans and disaster recovery procedures.