The Threat and Vulnerability Analyst is a part of the Security group within JRI-A. This individual is responsible for the configuration, deployment and maintenance of Information Security solutions. The Analyst defines and documents security standards and participates in technical research and development to enable continuing innovation for the security of the bank.
This role works with various IT teams to ensure security controls are implemented at all significant and relevant phases of all IT processes. Is accountable for detecting and assessing vulnerabilities in the bank’s technical infrastructure (e.g., software, hardware, networks, etc.) and for recommending tools to both fix/avoid issues and vulnerabilities in the future. Primary focus is on execution within defined parameters, under supervision of more experienced staff. Reports to the Security Systems Manager/Head of Systems Engineering. Has no direct/indirect reports.
The job responsibilities are described herein:
1 Works with internal IT Application, Infrastructure, Network and Support teams to ensure that security controls are implemented at all significant and relevant phases of IT processes.
2 Coordinates and performs security audits and vulnerability assessments to evaluate the bank's security procedures and compliance requirements.
3 Works with the SIEM / SOC team to review security event log data and investigate anomalies.
4 Deploys, manages and troubleshoots security monitoring agents and file integrity systems on all Unix, Linux and Windows operating systems.
5 Participates in incident response and investigations; tracks the remediation process.
6 Implements and supports information security solutions including security architectures, change/configuration management and the integration of security products as needed.
7 Performs testing to evaluate new products for network and security controls.
8 Maintains logging and monitoring standards, technical investigative techniques and reporting.
9 Installs and manages network/web application firewalls and cybersecurity fraud prevention system.
10 Adheres to project management methodology/SDLC/PLC processes as it relates to projects and their implementation.
1 Experience detecting and assessing threats.
2 Working technical knowledge of encryption technologies and PKI infrastructure experience with penetration testing tools (i.e., Nessus, Metasploit, NeXpose)
3 Familiarity with CIS benchmarks
4 Knowledge of web protocols and OWASP Top Ten
5 Ability to analyze vulnerabilities within internal infrastructure and oversee timely remediation
6 Ability to understand complex and highly technical information security concepts and explain/translate them to technical and business staff.
7 "Demonstrates a high degree of attention to detail and an ability to complete work accurately and in a
timely manner against strict deadlines"
8 Ability to collaborate with others, influence people and resolve conflicts
9 Excellent verbal and written communication skills.
2 to 5 years of specialized experience
Degree in Computer science or related field preferred
Networking technologies(TCP/IP) and protocols (SSL, SSH, LDAP, SMTP, DNS); Linux, Unix and Windows OS; Microsoft Active Directory; Security monitoring tools (SIEM, auditing and log collection tools, network IDS, malware detection); Microsoft Office, Visio and Project; knowledge of Bash shell, powershell, Python scripting.
CISSP and CEH certification are advantageous