Cyber Security Analyst II

Origin BankRuston, LA

About The Position

Origin Bank is seeking an experienced Cyber Security Analyst II to join our Cybersecurity department. This role is critical in safeguarding the bank’s sensitive data, systems, and customer information from cyber threats. The Analyst will primarily focus on be vulnerability management program, performing additional cybersecurity tasks as needed. Tasks include scanning, monitoring, analysis, remediation planning. Secondary duties include monitoring, analyzing, and responding to security incidents, implement protective measures, and monitoring compliance with industry regulations. This position requires a proactive problem-solver with solid technical skills and a deep understanding of cybersecurity best practices. Word Origin Bank is seeking an experienced Cyber Security Analyst II to join our Cybersecurity department. This role is critical in safeguarding the bank’s sensitive data, systems, and customer information from cyber threats. The Analyst will primarily focus on be vulnerability management program, performing additional cybersecurity tasks as needed. Tasks include scanning, monitoring, analysis, remediation planning. Secondary duties include monitoring, analyzing, and responding to security incidents, implement protective measures, and monitoring compliance with industry regulations. This position requires a proactive problem-solver with solid technical skills and a deep understanding of cybersecurity best practices.

Requirements

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.
  • 3-5 years of experience in cybersecurity or a related IT role, preferably in a financial services or banking environment.
  • Familiarity with common operating systems (Windows, Linux, Unix) and networking protocols (TCP/IP, HTTP, DNS, TLS).
  • Experience with security technologies such as firewalls, SIEM platforms, endpoint protection, encryption, and vulnerability management tools.
  • Hands-on experience with security monitoring tools.
  • Ability to read code and make security decisions from content.
  • Must have strong computer proficiency and understand how to use basic office applications, including MS Office (Word, Excel, and Outlook).
  • Strong analytical and problem-solving skills with a keen attention to detail and ability to work under pressure.
  • Ability to work both independently and as part of a collaborative team in a fast-paced environment.
  • Ability to work on larger projects as well as balance day to day requirements.
  • Strong writing\documentation skills necessary.
  • Regular and predictable attendance.

Nice To Haves

  • CISSP, CEH, CompTIA Security+, GSEC, or similar certifications.

Responsibilities

  • Vulnerability Monitoring: Conduct regular vulnerability scans using industry-standard tools (e.g., Nessus, Qualys).
  • Vulnerability Analysis: Monitor scan results, security alerts, system logs, and external threat intelligence feeds to identify potential vulnerabilities.
  • Risk Monitoring: Prioritize vulnerabilities based on risk assessments and business impact, recommending appropriate remediation strategies.
  • Enterprise Security: Monitor security alerts, system logs, and external threat intelligence feeds to identify potential vulnerabilities.
  • Documentation: Maintain up-to-date documentation of remediation processes, vulnerability management workflows, accepted risks, and compliance efforts.
  • Reporting: Assists in collecting metrics and preparing vulnerability assessment reports, highlighting key findings, risk levels, and remediation recommendations.
  • Continuous Improvement: Stay current with emerging vulnerabilities, threat trends, and best practices in vulnerability management.
  • Process Improvements: Contribute to the evolution of our vulnerability management framework and security policies to enhance overall protection. Assist in evaluation of new cybersecurity vendors and tools.
  • Remediation Coordination: Collaborate with internal teams to design and implement remediation plans, including patch management and configuration changes.
  • Remediation Monitoring: Track remediation progress and verify the effectiveness of applied fixes through follow-up scans and tests.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service