Information Security Analyst III

SchoolsFirst Federal Credit UnionSacramento, CA
14h$53 - $85

About The Position

The Information Security Analyst III, Threat Intelligence & Insider Threat supports the organization’s cyber threat intelligence and insider threat programs, transforming cybersecurity from a reactive function into a strategic business enabler. This skilled cybersecurity role proactively identifies, analyzes, and disseminates actionable intelligence from emerging cyber threats and insider risks. Develop and refine threat detection capabilities across tools and processes. The position serves as a bridge between technical teams, business units and management, collaborating as part of a cross-functional teams to ensure that threat insights are integrated into security operations, risk management, and executive decision-making, supporting business resilience, regulatory compliance, and enterprise-wide risk mitigation. Performs daily operations and monitor events from multiple sources including, but not limited to, SIEM consoles, network and host based intrusion detection systems, firewall consoles, system logs (Unix and Windows), applications, databases, and other security information monitoring tools. Participates in knowledge sharing with other analysts and writing technical articles for internal Knowledgebase. Creates and maintains documentation for procedures and process improvement. Interfaces with users to understand their security needs and implements procedures that support security and business initiatives. Ensures users understand and adhere to necessary procedures to maintain security. Conducts accurate evaluation of the level of security required when requests are made by other teammembers and ensures that appropriate security measures are in effect to maintain an appropriate level of security confidentiality, availability and integrity. Weighs business needs against security concerns, finds the right solution to support the business and articulates any issues to management. Assists in the development, implementation and periodic review of security policies, procedures and metrics to ensure we are applying industry best practices and standards. Performs security assessments and reviews local area networking initiatives for security compliance. Ensures system resource configurations, software, applications and processes or guidelines comply with Information Security requirements, policies and standards. Assists in the planning, organizing and implementation of Information Security related projects.

Requirements

  • Bachelor's Degree or equivalent years of experience required
  • 5-7 years Previous Experience required
  • May require familiarity with domain structures, user authentication, and digital signatures
  • Conducts accurate evaluation of the level of security required
  • Requires an understanding of firewall theory and other security system configurations
  • Has in-depth knowledge of intrusion detection and Internet architecture
  • Must be able to weigh business needs against security concerns and articulate issues to management

Nice To Haves

  • CISSP, SANS GIAC or equivalent preferred

Responsibilities

  • Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
  • Ensures that teammembers understand and adhere to necessary procedures to maintain security.
  • The Information Security Analyst III, Threat Intelligence & Insider Threat supports the organization’s cyber threat intelligence and insider threat programs, transforming cybersecurity from a reactive function into a strategic business enabler.
  • This skilled cybersecurity role proactively identifies, analyzes, and disseminates actionable intelligence from emerging cyber threats and insider risks.
  • Develop and refine threat detection capabilities across tools and processes.
  • The position serves as a bridge between technical teams, business units and management, collaborating as part of a cross-functional teams to ensure that threat insights are integrated into security operations, risk management, and executive decision-making, supporting business resilience, regulatory compliance, and enterprise-wide risk mitigation.
  • Performs daily operations and monitor events from multiple sources including, but not limited to, SIEM consoles, network and host based intrusion detection systems, firewall consoles, system logs (Unix and Windows), applications, databases, and other security information monitoring tools.
  • Participates in knowledge sharing with other analysts and writing technical articles for internal Knowledgebase.
  • Creates and maintains documentation for procedures and process improvement.
  • Interfaces with users to understand their security needs and implements procedures that support security and business initiatives.
  • Ensures users understand and adhere to necessary procedures to maintain security.
  • Conducts accurate evaluation of the level of security required when requests are made by other teammembers and ensures that appropriate security measures are in effect to maintain an appropriate level of security confidentiality, availability and integrity.
  • Weighs business needs against security concerns, finds the right solution to support the business and articulates any issues to management.
  • Assists in the development, implementation and periodic review of security policies, procedures and metrics to ensure we are applying industry best practices and standards.
  • Performs security assessments and reviews local area networking initiatives for security compliance.
  • Ensures system resource configurations, software, applications and processes or guidelines comply with Information Security requirements, policies and standards.
  • Assists in the planning, organizing and implementation of Information Security related projects.
  • Performs other duties as assigned
  • Complies with regulatory compliance and assigned training requirements including but not limited to BSA regulations corresponding to their specific job duties.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service