Lead Cybersecurity Analyst
Madison, WI, United States
ZILLION TECHNOLOGIES, INC
Company Description
Zillion Technologies Inc. - (ZTI) is a global business consulting and technology solutions provider. Zillion delivers innovative business solutions that give clients a competitive edge.
Job Description
Job Title: Lead Cybersecurity Analyst
Location: Remote
Hiring a Lead Cybersecurity Analyst for our Cybersecurity Operations team.
In this role, your primary responsibilities will be overseeing daily cybersecurity operations and leading cybersecurity incident response activities. This includes architecting and supporting the cybersecurity operations center (CSOC) technology portfolio and cybersecurity risk management program. This position is also expected to lead efforts that help mature the cybersecurity operations program, capabilities, and processes. You will be expected to serve as a mentor to the team, and to provide input into the overall cybersecurity program and strategy. You will work closely with other IT departments and key stakeholders to deliver solutions that meet business needs and provide consulting services to reduce risk for cyber assets, identify emerging threats and technologies, and help set technical standards for the department and company.
What you will do:
- Lead incident response efforts, such as responding to identified malicious activity or highly critical vulnerabilities that pose a threat to the organization.
- Onboard data, configure integrations, and setup security alerting for the security information and event management (SIEM) solution, which includes parsing and analyzing large, complex data sets and integrating into the security case management system.
- Leverage knowledge in multiple security disciplines, such as Windows, Unix, Linux, data loss prevention (DLP), endpoint controls, databases, wireless security, and data networking, to offer global solutions for a complex heterogeneous environment.
- Responsible for the continuous maturity of monitoring and incident response capabilities.
- Stay current with, and remain knowledgeable, about new threats. Analyze attacker tactics, techniques, and procedures (TTPs) from security events across a large heterogeneous network of security devices and end-user systems.
- Conduct cyber investigations including suspicious files analysis across applications, networks, and endpoints, including memory and disk forensics, to determine maliciousness. Analysis requires knowledge of traditional malware, but also repurposed files that are not malicious, as well as targeted malware and zero-day attacks.
- Acts as primary security resource for strategic initiatives by providing security reviews and mitigation recommendations that address concerns going forward.
- Provides leadership for cyber team including setting standards, identifying emerging threats, mentoring team on how to mitigate risks, and collaborating with business and IT resources.
- Promotes strategic comprehensive planning by identifying advocating for security solutions or practices that substantially reduce the cyber risk of organization.
- Engages in other duties as needed that support Client’s Values and helps deliver on our Purpose to serve customers and build stronger communities.
Qualifications
Education Requirements:
- Bachelor's Degree Information Technology. [Preferred]
- Certification relevant information security certifications (e.g., CISSP, CISA, CISM, CRISC, or GIAC) or the ability to gain a certification within 6 months of hire. [Required]
Required Experience:
- 8 years of cybersecurity work experience.
- Experience using malware analysis, forensics solutions and utilities.
- Experience in cyber investigations using formal chain-of-custody methods.
- Solid knowledge and experience with IT security aspects of operating systems, Active Directory, database (SQL) access, LDAP, Microsoft SharePoint, web server configurations, networks server administration, data networking, firewall administration, cloud technologies, and/or application development.
- Experience working in a regulated industry and be familiar with government and industry regulations that involve information security. These include PCI, FISMA, GLBA, FERPA, NERC CIP, TSA, HIPAA, or SOX.
- Solid understanding and experience with security development lifecycle (SDL) processes for internally developed applications, including the web-based and Internet facing components.
- Experience managing security related projects involving multiple teams, utilizing project management tools (task allocation, check point meetings, project milestones, etc.).
Preferred Experience:
- 6 years of security monitoring and incident response experience.
- 4 years of in-depth security log analysis experience.
Knowledge, Skills, and Abilities:
- Able to architect, lead teams, and provided mentorship in the following areas:
- Secure by design.
- Security development lifecycle (SDL).
- IT security aspects of operating systems, Active Directory, database (SQL) access, LDAP, Microsoft SharePoint, web server configurations, and networks, server administration, data networking, firewall administration, and/or applications development.
- Information risk management.
- Managing cybersecurity related projects or programs.
- In depth knowledge of utility industry, technology trends, cybersecurity, and regulatory changes.
- Excellent collaboration skills - able to lead cross-functional teams to deliver cybersecurity initiatives.
- Able to architect, lead teams, and mentor others in Secure by design, security development lifecycle (SDL), information risk management, and managing cybersecurity related projects or programs.
Key Skills:
• Access Control Management • Application Security • Cloud Networking • Cybersecurity Risk Management • DevSecOps • Identity and Access Management (IAM) • Incident Management • Incident Response • Information Security Management • IT Risk Management • Intrusion Detection • IT Security Management • Network Penetration Testing • Network Security Management • Security Architecture Design • Security Governance • Threat Modeling • Vulnerability Management.
Additional Information
Thanks & Regards,
Praveen Kumar,
Sr. Recruiter
Zillion Technologies Inc
E-mail: praveen(at)zilliontechnologies(dot)com
Phone: 571-814-3745
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Application security CISA CISM CISSP Cloud CRISC CSOC DevSecOps Firewalls FISMA Forensics GIAC GLBA Governance HIPAA IAM Incident response Intrusion detection LDAP Linux Log analysis Malware Monitoring NERC CIP Network security Pentesting Risk management SharePoint SIEM SOX SQL Strategy TTPs UNIX Vulnerabilities Vulnerability management Windows Zero-day
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.