Job Title: Information Security Analyst
Company: BLACKSTONE TECHNOLOGY GROUP
Information Security Fraud Analyst will actively engage in protecting Bank clients and information from loss associated with malicious activity. The Analyst will recommend, implement, and continually improve a wide range of fraud detection systems; monitor, collect and analyze threat intelligence; and collaborate in incident response with other information security, information technology and business operational functions. The person in this position will also be responsible for helping protect information stored on computers and networks, and may also configure and maintain security technologies. This role is under the supervision of Lead Information Security Analyst and guidance from the Director of Information Security.
Role and Responsibilities
2-4+ years of Information Security experience, with two or more years in incident response, threat intelligence and fraud detection. A combination of education and experience may meet requirements.
Experience in Information Technology and Information Security audits, review SOC reports, vendor reviews and
Excellent problem solving and troubleshooting skills using root cause analysis techniques.
Extensive knowledge of financial fraud, social engineering methods and information security practices and procedures
Knowledge of malware, particularly financial malware experience preferred.
Track and report ATM, ACH and Wire Fraud activities
Ability to evaluate information security controls and identification of potential risk.
Must be detailed oriented and have good analytical, documentation, time management, communication and interpersonal skills.
Must have the ability to communicate complicated concepts in writing.
As a part of day to day incident response requirements, you be able to respond, review, research, security alerts in a timely manner.
Ability to identify risks to bank from policy violation, internal or external attacks or attempts to infiltrate company email, data and web-based systems
Plan, coordinate, perform, and report on information security compliance assessments and related services
Develop and maintain internal client relationships
Produce security risk advisories based on newly identified threats and risk assessment
The ability to work independently in a 24/7 complex, sophisticated technical environment
Provide cradle to grave lifecycle management of cyber security toolsets consumed by peer functions within the deployment, administration, maintenance, configuration change management, monitoring, troubleshooting, capacity estimation, status and service metrics reporting, decommission and other service assurance activities.
Provide incident response support as a toolset specific SME for security sevents including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misused and network breaches.
Collaborate with IT and other Business Unit management and SMEs.
Experience with SIEM Technologies, log harvesting/routing/management tools, Security Analytics Platforms, Network Recording and forensic offerings.
Additional cyber security toolsets, including fraud monitoring, data leakage prevention, and privileged access monitoring is a plus.
Experienced with PCI-DSS, HIPAA, Bank Secrecy Act, FDIC and other regulatory frameworks is highly desired.
Experienced working with various Securing appliances
A sociable, likeable “people person” who gets along well with colleagues
A capable professional communicator, able to research, prepare and deliver high quality, clearly-written awareness/training materials without grammatical or spelling errors
Proactive and self-motivated, forward thinking, someone who is willing to take the lead on security awareness and fraud.
Technical understanding of vulnerabilities and how attackers can exploit vulnerabilities to compromise systems
Ability to perform and document internal and external vulnerability assessments
Familiarity with creating lab environments and automating test procedures
Ability to resolve network and system security issues using computer host analysis, forensics, and reverse engineering
Ability to define and maintain standards and product selection methodology, review and approve solution architecture and design from a security perspective
Familiarity with the following activities:
Security tools implementation
Security tools administration
Intrusion detection alert evaluation and response
Vulnerability scanning result analysis and reporting
Network firewall monitoring
Application firewall, antivirus monitoring
Security event management response and reporting
Encryption status monitoring
Security data and alert analysis
Network security audit
Ability to manage technologies, including OS patches, system hardening, and application configuration is a plus
Working knowledge of security technologies such as DLP, SIEM, IDS/IPS, Web filters, two factor authentication, web application firewalls, Active Directory