Information Security Analyst I

Centennial BankConway, AR
1d

About The Position

The Information Security Analyst I, as part of the Cyber Defense Operations Team, helps defend Centennial Bank against cyber threats by responding to information security alerts, investigating malicious activity, and aiding in incident handling, along with helping in maintaining overall information security across the organization through vulnerability management, phishing email analysis, and providing general information security expertise.

Requirements

  • Knowledge of a specialized field (however acquired), such as basic accounting, computer, etc. Equivalent of four years in high school, plus night, trade extension, or correspondence school specialized training, equal to two years of college, plus 4 years related experience and/or training, or equivalent combination of education and experience.
  • Ability to effectively communicate information and respond to questions in person-to-person and small group situations with customers, clients, general public and other employees of the organization.
  • Ability to read, analyze, and understand general business/company related articles and professional journals; ability to speak effectively before groups of customers or employees.
  • ability to write reports, business correspondence, and policy/procedure manuals; ability to effectively present information and respond to questions from groups of managers, clients, customers, and the general public.
  • Ability to read, analyze, and understand common scientific and technical journals, financial reports, and legal documents; ability to respond to complex or difficult inquiries or complaints from customers, regulatory agencies, or members of the business community.
  • Ability to calculate figures and amounts such as discounts, interest, commissions, proportions, percentages, area, circumference, and volume.
  • Ability to apply concepts such as fractions, ratios, and proportions to practical situations.
  • Ability to define problems, collect data, establish facts, and draw valid conclusions.
  • Ability to interpret an extensive variety of technical instructions in mathematical or diagram form and deal with several abstract and concrete variables.
  • Intermediate: 10-Key, Alphanumeric Data Entry, Contact Management, Presentation/PowerPoint, Spreadsheet, Word Processing/Typing
  • Basic: Accounting, Database
  • A high school degree plus four (4) years of related experience and/or training in IT, or a two (2) year college degree plus two (2) years of related experience and/or training in IT, or a four (4) degree college degree related to or with an emphasis in Information Security.
  • Preferred Knowledge of cyber security concepts such as:
  • -Endpoint detection and response
  • -Log analysis
  • -Incident response
  • -Vulnerability scanning
  • -Phishing email analysis
  • -Investigating information security tool alerts and executing triage processes-Knowledge in networking and endpoint administration

Nice To Haves

  • Security (CCNA) Certification, Security+ Certification, Security Operations Analyst Associate, Offsec Defense Analyst, or another related certification is preferred.

Responsibilities

  • Investigates security alerts and events to identify relevancy and urgency, triaging and responding based on set security operation processes.
  • Facilitates network and endpoint security monitoring using a wide variety of tools, including Endpoint Detection and Response (EDR), Network Monitoring, Security Information and Event Management (SIEM), Data Loss Prevention (DLP), Identity Management, etc.
  • Monitors the health of security tools and agents, including facilitating the discovery of potential gaps in coverage.
  • Administers endpoint protection software and other security tools, as necessary.
  • Analyzes phishing emails to create and follow through with appropriate response plan.
  • Participates in the vulnerability management lifecycle by helping identify, report, and suggest remediation steps for vulnerabilities discovered in the network.
  • Participates in cyber incident response activities or projects.
  • Using approved tools, assists in conducting Red Team tests to determine potential security flaws and provides recommendations for remediation.
  • Evaluates complex security events using critical thinking and problem solving.
  • Collaborates with multiple diverse teams, both locally and remotely, regarding IT security concerns.
  • Completes required BSA/AML training and all other required training sessions, as assigned.
  • The ability to work in a constant state of alertness and in a safe manner.
  • Perform any other related duties as required or assigned.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service