Cyber Security Analyst

Job Details:

Summary:

Analyze and determine the scope of threats to the enterprise, vulnerabilities in software, and determine how our company will best defend itself against these threats.
Monitor third-party security-related feeds, websites, forums, and mailing lists for information regarding cyber threats, vulnerabilities and exploits. Verify vulnerabilities; correlate and collate the information; and develop, edit, and deliver security reports to enterprise-level customers. On occasion replicate reported vulnerabilities in a lab environment and, where appropriate, develop proof of concept and/or exploit tools against these vulnerabilities.

Essential Duties and Responsibilities:

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.

Perform duties across several Cyber disciplines, activities may include:

Intelligence Analysis:

  • Develop and provide threat and situational intelligence leveraging proprietary enterprise data, as well as a variety of external sources and open source data.
  • Actively monitor and research cyber threats with a direct or indirect impact to the OCC brand, business operations, or technology infrastructure.
  • Develop and support briefings to Security management as a cyber intelligence subject matter expert.
  • Create and conduct presentations on current threats and related IT Security topics.
  • Provide monthly reporting to Security management on Threat, Vulnerability, and Incident management metrics.

Network Security Operations Analysis:

  • Prioritize and identify security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives.

Incident Management and Forensic Analysis:

  • Participate in cyber security incident response activities, including investigation, coordination, and reporting.
  • Assist in the collection and preservation of evidence associated with cyber security incident response activities following industry best practices and established procedures.
  • Develop and support briefings to Security management as a cyber-forensic subject matter expert.

Supervisory Responsibilities:

None

Qualifications:

The requirements listed below are representative of the knowledge, skill, and/or ability required.  Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Proven team player, will be working individually and with other staff members, on both long-term projects and rapid response under tight deadlines.
  • Effective and excellent oral and written communication, analytical, judgment and consultation skills.
  • Ability to effectively communicate in both formal and informal review settings with all levels of management.
  • Proven experience in developing and providing threat and situational intelligence from a variety of internal and external sources.
  • Ability to work with local and remote IT staff/management, vendors and consultants.
  • Ability to work independently and possess strong project management skills

Technical Skills:

Demonstrated proficiency in:

  • Implementation and maintenance of SIEM (ArcSight, IBM Qradar, McAfee NitroSecurity, etc.)
  • Forensic analysis tools (MIR, EnCase, FTK)
  • Malware analysis tools (dynamic and static)
  • Vulnerability assessment tools (Qualys, ISS Scanner, nmap, etc.)
  • Secure Web Gateway (BlueCoat, Microsoft Forefront)
  • Network sniffers and packet tracing tools (DSS, NAI SnifferPro, Ethereal and tcpdump).
  • Encryption technologies (PGP, PKI and X.509)
  • Standard technical writing tools including MS Word, Excel, Project and Visio

Familiarity with:

  • Directory services, LDAP, and their inherent security (Active Directory, CA Directory).
  • Proxy and caching services.
  • Client/server platforms including Sun Solaris, Windows, Linux.
  • Operating system hardening procedures (Solaris, Linux, Windows, etc.)
  • LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP and NSRP).

Di2017

Step 1
When you find a position you’re interested in, click the ‘Apply’ button. Please complete the application and attach your resume.

Step 2
You will receive an email notification to confirm that we’ve received your application.

Step 3
If you are called in for an interview, a representative from OCC will contact you to set up a date, time, and location.

For more information about OCC, please clickhere

OCC is an Equal Opportunity Employer

Source:https://theocc.wd5.myworkdayjobs.com/en-US/careers/job/Chicago/Cyber-Security-Analyst_REQ-447?source=Indeed