Thursday, April 12, 2018

Information Security Analyst

Job Title: Information Security Analyst 
Company: BLACKSTONE TECHNOLOGY GROUP 

Primary Function 

Information Security Fraud Analyst will actively engage in protecting Bank clients and information from loss associated with malicious activity. The Analyst will recommend, implement, and continually improve a wide range of fraud detection systems; monitor, collect and analyze threat intelligence; and collaborate in incident response with other information security, information technology and business operational functions. The person in this position will also be responsible for helping protect information stored on computers and networks, and may also configure and maintain security technologies. This role is under the supervision of Lead Information Security Analyst and guidance from the Director of Information Security. 

Role and Responsibilities 

2-4+ years of Information Security experience, with two or more years in incident response, threat intelligence and fraud detection. A combination of education and experience may meet requirements. 
Experience in Information Technology and Information Security audits, review SOC reports, vendor reviews and 
Excellent problem solving and troubleshooting skills using root cause analysis techniques. 
Extensive knowledge of financial fraud, social engineering methods and information security practices and procedures 
Knowledge of malware, particularly financial malware experience preferred. 
Track and report ATM, ACH and Wire Fraud activities 
Ability to evaluate information security controls and identification of potential risk. 
Must be detailed oriented and have good analytical, documentation, time management, communication and interpersonal skills. 
Must have the ability to communicate complicated concepts in writing. 
As a part of day to day incident response requirements, you be able to respond, review, research, security alerts in a timely manner. 
Ability to identify risks to bank from policy violation, internal or external attacks or attempts to infiltrate company email, data and web-based systems 
Plan, coordinate, perform, and report on information security compliance assessments and related services 
Develop and maintain internal client relationships 
Produce security risk advisories based on newly identified threats and risk assessment 
The ability to work independently in a 24/7 complex, sophisticated technical environment 




Preferred Skills 

Provide cradle to grave lifecycle management of cyber security toolsets consumed by peer functions within the deployment, administration, maintenance, configuration change management, monitoring, troubleshooting, capacity estimation, status and service metrics reporting, decommission and other service assurance activities. 
Provide incident response support as a toolset specific SME for security sevents including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misused and network breaches. 
Collaborate with IT and other Business Unit management and SMEs. 
Experience with SIEM Technologies, log harvesting/routing/management tools, Security Analytics Platforms, Network Recording and forensic offerings. 
Additional cyber security toolsets, including fraud monitoring, data leakage prevention, and privileged access monitoring is a plus. 
Experienced with PCI-DSS, HIPAA, Bank Secrecy Act, FDIC and other regulatory frameworks is highly desired. 
Experienced working with various Securing appliances 
A sociable, likeable “people person” who gets along well with colleagues 
A capable professional communicator, able to research, prepare and deliver high quality, clearly-written awareness/training materials without grammatical or spelling errors 
Proactive and self-motivated, forward thinking, someone who is willing to take the lead on security awareness and fraud. 
Technical understanding of vulnerabilities and how attackers can exploit vulnerabilities to compromise systems 
Ability to perform and document internal and external vulnerability assessments 
Familiarity with creating lab environments and automating test procedures 
Ability to resolve network and system security issues using computer host analysis, forensics, and reverse engineering 
Ability to define and maintain standards and product selection methodology, review and approve solution architecture and design from a security perspective 
Familiarity with the following activities: 
Security tools implementation 
Security tools administration 
Intrusion detection alert evaluation and response 
Vulnerability scanning result analysis and reporting 
Network firewall monitoring 
Application firewall, antivirus monitoring 
Security event management response and reporting 
Encryption status monitoring 
Security data and alert analysis 
Network security audit 
Ability to manage technologies, including OS patches, system hardening, and application configuration is a plus 
Working knowledge of security technologies such as DLP, SIEM, IDS/IPS, Web filters, two factor authentication, web application firewalls, Active Directory