Associate Principal, Cyber Defense

Chicago - 125 S Franklin

Apply now Apply later

What You'll Do:

The Associate Principal, Cyber Defense is responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques.

Primary Duties and Responsibilities:

To perform this job successfully, an individual must be able to perform each primary duty satisfactorily.

Perform duties across several Cyber disciplines, activities may include:

Security Monitoring:

  • Monitor security alerts and events from various security tools and technologies.

  • Perform advanced analysis of security logs, network traffic, and endpoint data.

Incident Response:

  • Review and respond to security incidents escalated by Tier 1 analysts.

  • Conduct thorough investigations to determine the scope and impact of security incidents.

  • Implement containment, eradication, and recovery measures for confirmed incidents.

  • Document and report findings, actions taken, and lessons learned.

Collaboration and Communication:

  • Work closely with threat intelligence team to enhance detection and response capabilities.

  • Collaborate with other security team members and IT staff to address security incidents.

  • Provide guidance and support to Tier 1 analysts on complex security issues.

  • Communicate effectively with stakeholders regarding security incidents and mitigation efforts.

Continuous Improvement:

  • Participate in post-incident reviews to identify areas for improvement.

  • Stay current with the latest cybersecurity trends, threats, and technologies.

  • Contribute to the development and enhancement of SOC processes and procedures.

Supervisory Responsibilities:

  • None

Qualifications:

The requirements listed are representative of the knowledge, skill, and/or ability required.  Reasonable accommodations may be made to enable individuals with disabilities to perform the primary functions.

  • Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines.

  • Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets.

  • Knowledge and experience implementing controls based on security regulation (e.g., NIST Cyber Security Framework) is a plus.

  • Effective and excellent oral and written communication, analytical, judgment and consultation skills.

  • Ability to effectively communicate in both formal and informal review settings with all levels of management.

  • Ability to work with local and remote IT staff/management, vendors and consultants.

  • Ability to work independently and possess strong project management skills.

Technical Skills:

Demonstrated proficiency in:

  • Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.).

  • SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus.

  • Endpoint detection and response tools, e.g. CrowdStrike, SentinelOne, Microsoft Defender, etc.

  • Incident Response playbook development, managing security incident analysis and remediation.

  • Network-based preventative and detective technologies (IDS/IPS, firewalls, proxy servers)

  • Standard technical writing tools including MS Word, Excel, Project and Visio

Familiarity with:

  • Vulnerability assessment tools (Qualys, Nessus, nmap, etc.).

  • Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID).

  • Client/server platforms including Sun Solaris, Windows, Linux.

  • Operating system hardening procedures (Solaris, Linux, Windows, etc.)

  • Web Application Firewalls.

  • Cloud based security tools and techniques (AWS, Azure, GCP, etc.)

Some experience:

  • Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices.

Education and/or Experience:

  • Bachelor’s degree in cybersecurity, computer science, or another related field.

  • Minimum three years of information security experience, preferably in the financial services industry.

  • Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response.

  • Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives.

  • Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure.

  • Industry knowledge of leading-edge security technologies and methods.

  • Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities.

  • Previous people/project management experience is a plus.

Certificates or Licenses:

  • Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.

Who We Are

The Options Clearing Corporation (OCC) is the world's largest equity derivatives clearing organization. Founded in 1973, OCC is dedicated to promoting stability and market integrity by delivering clearing and settlement services for options, futures and securities lending transactions. As a Systemically Important Financial Market Utility (SIFMU), OCC operates under the jurisdiction of the U.S. Securities and Exchange Commission (SEC), the U.S. Commodity Futures Trading Commission (CFTC), and the Board of Governors of the Federal Reserve System. OCC has more than 100 clearing members and provides central counterparty (CCP) clearing and settlement services to 19 exchanges and trading platforms. More information about OCC is available at www.theocc.com.

What We Offer

A highly collaborative and supportive environment developed to encourage work-life balance and employee wellness. Some of these components include:

A hybrid work environment, up to 2 days per week of remote work

Tuition Reimbursement to support your continued education

Student Loan Repayment Assistance

Technology Stipend allowing you to use the device of your choice to connect to our network while working remotely

Generous PTO and Parental leave

Competitive health benefits including medical, dental and vision

Step 1
When you find a position you're interested in, click the 'Apply' button. Please complete the application and attach your resume.  

Step 2
You will receive an email notification to confirm that we've received your application.

Step 3
If you are called in for an interview, a representative from OCC will contact you to set up a date, time, and location. 

For more information about OCC, please click here.

OCC is an Equal Opportunity Employer

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: Active Directory APIs Application security AWS Azure CASP+ CHFI CISSP Cloud Computer Science CrowdStrike Cyber defense EDR Firewalls GCFA GCIA GCIH GCP IDS Incident response IPS LDAP Linux Log analysis LogRhythm Monitoring Nessus NIST Nmap QRadar Qualys Scripting SIEM SOAR SOC Solaris Splunk Threat intelligence Windows XSOAR

Perks/benefits: Health care Home office stipend Medical leave Parental leave Team events Wellness

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.