Senior Security Analyst
Remote - India
Applications have closed
ABOUT OPORTUN
Oportun (Nasdaq: OPRT) is a mission-driven fintech that puts its 2.0 million members' financial goals within reach. With intelligent borrowing, savings, and budgeting capabilities, Oportun empowers members with the confidence to build a better financial future. Since inception, Oportun has provided more than $16.6 billion in responsible and affordable credit, saved its members more than $2.4 billion in interest and fees, and helped its members save an average of more than $1,800 annually. Oportun has been certified as a Community Development Financial Institution (CDFI) since 2009.
WORKING AT OPORTUN
Working at Oportun means enjoying a differentiated experience of being part of a team that fosters a diverse, equitable and inclusive culture where we all feel a sense of belonging and are encouraged to share our perspectives. This inclusive culture is directly connected to our organization's performance and ability to fulfill our mission of delivering affordable credit to those left out of the financial mainstream. We celebrate and nurture our inclusive culture through our employee resource groups.
Oportun is looking for a Sr Security Analyst, with a passion for conducting the technical analysis for events. This includes immediate containment, investigation and management of remediation actions, as well as enhancing defenses with the new knowledge acquired throughout the response process. This is a 24/7 position on rotational shift.
RESPONSIBILITIES- Monitor and analyze traffic and events/alerts escalated by L2 and advise on remediation actions.
- Review and assess impact and remediation actions for incidents.
- Creation and continuous improvement of monitoring alerts
- Deep analysis of security incidents to identify the root cause
- Create new rules in SIEM to identify threats.
- Monitor and analyze traffic and events/alerts and advise on remediation actions.
- Review and assess impact and remediation actions for incidents.
- Investigate intrusion attempts and perform analysis of exploits by correlating various sources and determining which system or data set is affected.
- Follow standard operating procedures for detecting, classifying, and reporting incidents.
- Analyze a variety of network and host-based security appliance logs (EDR, Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident.
- Independently follow procedures to identify, contain, analyze, document and eradicate malicious activity.
- Escalate information regarding intrusion events, security incidents, and other threat indicators and warning information to the client.
- Bachelor’s degree in computer science, information systems or related field from an accredited institution OR 5 years of relevant experience in SOC, Incident response or Cyber Forensics.
- Experience in decoding logs from different security devices like Firewall, proxy, EDR etc.,
- Experience in handling cyber incidents on a day to day basis.
- Experience in performing L1 analysis of tickets and determining if its a false positive or not.
- Experience in correlating incidents.
- Experience in understanding network architecture and connecting events logically.
- Experience working in or with different teams like network, engineering, application etc.,
- Ability to communicate efficiently with internal team members at all levels and across functional and organizational boundaries.
- Working knowledge of the TCP/IP suite/OSI layers of protocols.
- Conceptual knowledge of network and systems architecture.
- Familiarity with Intrusion Detection Systems configuration and operation.
- Web application architecture.
- Active Directory Solid understanding of how major application layer protocols function (e.g., HTTP, SMTP, DNS).
- Knowledge of categories of malware and how they function (e.g., rootkits, trojans, adware, exploits, fileless).
- Organizational skills and time management/prioritization.
- Comfortable working against deadlines in a fast-paced environment.
- At least 3 years of prior SOC experience (can include internships).
- Ability to build a strong, positive relationship with partnering engineering and security teams to develop effective solutions.
- Ability to sufficiently document engineering efforts and results.
- Passion for Security, Technology and Automation.
- Preferred Certifications (Security+, etc.).
We are proud to be an Equal Opportunity Employer and consider all qualified applicants for employment opportunities without regard to race, age, color, religion, gender, national origin, disability, sexual orientation, veteran status or any other category protected by the laws or regulations in the locations where we operate.
California applicants can find a copy of Oportun's CCPA Notice here: https://oportun.com/privacy/california-privacy-notice/.
We will never request personal identifiable information (bank, credit card, etc.) before you are hired. We do not charge you for pre-employment fees such as background checks, training, or equipment. If you think you have been a victim of fraud by someone posing as us, please report your experience to the FBI’s Internet Crime Complaint Center (IC3).
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Automation CCPA Computer Science DNS EDR Exploits FinTech Firewalls Forensics Incident response Intrusion detection Malware Monitoring Privacy SIEM SMTP SOC TCP/IP
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.