Information Security Analyst

Our team believes in providing IT value to the organization and supporting a culture of performance through our experience-focus and results-driven approach. Our information and cyber security program ensures that Confidentiality, Integrity, and Availability are maintained to protect the Credit Union and our members. The Information Security Analyst is responsible for supporting computer network/system defense, threat identification, vulnerability management, corrective actions, security solutions development, and response for incidents and breaches.
The analyst assists with the development of information security standards, procedures as well as maintenance, design, and training and awareness activities to ensure the Credit Union's security program meets regulatory requirements, industry guidelines, and best practices.
The analyst assists with the disaster recovery program, performs and oversees network penetration tests, vulnerability assessment scans and assessment reviews, and ensures that controls are aligned with the NIST framework. The analyst also monitors security trends and events from various channels (Vendors, Industry Sources, SIEM, Internal Threat/Incident Reporting, Email, and Phone). Based on security threats/events and severity, coordinates effective response and remediation.
This role works cross-functionally with other members of the Information Security team, Risk Management department, and the CISO to support our risk-based information security program. Fostering positive working relationships with third parties and teams within the credit union is a critical success factor.
analyst follows an established risk-based approach to oversee our IT controls environment and respective environmental changes. They actively participate in decision making with third parties and internal credit union management for mitigating identified deficiencies. They seek to understand, inform, and communicate the broader impact of information security actions during the decision-making process.
These responsibilities are done within all Credit Union policies and procedures as well as all applicable laws, regulations, and industry best practices.
Monitoring & Analysis ? Conducts system monitoring and intrusion detection analysis through controls/platforms such as SIEM, NAC, IDS/IPS, Vulnerability Management tools, and Host Based Security Systems. Correlates activity across networks to identify trends of unauthorized use. Performs compensating controls analysis and validates efficacy of existing controls
Threat Management - Researches emerging threats and vulnerabilities to aid in the identification of network incidents. Analyzes data from threat and vulnerability feeds and analyzes data for applicability to the organization. Identifies and resolves false positive findings in assessment results.
Incident Response ? Oversee incident response operations and respective threat/incident reporting system/processes. Coordinates incident response, including mitigating actions to contain activity and facilitating forensics analysis when necessary. Makes real-time decisions about incidents as they occur.
Controls Management ? Manages and maintain information security monitoring/correlation controls (in-house and hosted). This includes, but is not limited to SIEM, Vulnerability Scanning, Logging, IDS/IPS, and Social Engineering Testing Platform.
Education ? Oversee Mock-Phishing and the CU-Wide cyber education training platform. Monitor and report effectiveness of the established training and Mock-Phishing programs. Provide suggestions to IT management for program improvements and evolving platform enhancements. Works closely with the CU Learning and Organizational Development team for coordinated cyber training efforts.
Reporting - Reviews alerts and data from reporting systems and documents formal, technical incident reports. Generates weekly and monthly summary reports for established program KPIs and performs trending analysis. Reports and tracks findings and summarizes to facilitate remediation tasks. Produces vulnerability, configuration, and coverage metrics and reporting to demonstrate assessment coverage and remediation effectiveness.
DR/BCP - Contributes to the planning, design, implementation, and testing of the IT Disaster Recovery and failover plans. This includes conducting disaster recovery tests, publishing test results, and making changes necessary to address deficiencies.
Continual Improvement - Conduct research on new and emerging products, services, protocols, and standards in support of security enhancement and development. Review and adjust any existing controls, documentation, or processes that are currently in place. Recommends improvements to IT Management. Design and implement security solutions and controls to maintain compliance with existing, new, or changing regulations, auditing requirements, and industry best practices.
Project Management - Coordinate and lead information security projects and reviews with internal business units and third-party vendors as necessary. Maintain strong project timelines and works collectively with various IT staff in various technical discipline levels to mitigate findings through coordinated project engagements.
Documentation - Author and maintain appropriate information security documentation pertaining to various systems, applications, processes, standards, and procedures.
Vendor Management - Work with respective vendors to manage products lifecycles, product growth/evolution, licensing, and performance (e.g. SIEM, IDS/IPS, Vulnerability Management).
Other duties and tasks as assigned. The list of essential duties is not exhaustive. It may be supplemented as necessary from time to time.
This position may require extended or after-hours/on-call support to include weekends and / or holidays.
Bachelor's degree in Information Technology or related field obtained through a formal
Education program from an accredited higher education institution OR.
5+ years of work experience in an information security analyst or administrator role.
Possesses an Industry recognized Security-based certification (for example: CompTIA Security+, CompTIA Advanced Security Practitioner ? CASP, or higher).
In-depth knowledge of information security analysis, response, reporting, and remediation.
Broad hands-on knowledge of next-generation firewalls, SIEM, IDS/IPS, DLP, anti-virus/malware systems, data encryption, and industry-standard techniques and practices.
Ability to communication effectively orally and in writing.
to interact and work effectively with a participative team environment to include inter-departmental support, department/branch managers, senior executives, and vendors.
Ability to handle, prioritize, and reprioritizes multiple tasks with little/no advanced notice.
Ability to translate and communicate technical terms to all levels of the organization.
Maintains an organized and efficient work area free from clutter.
Willingness to comply with established directives, policies, and industry best practices.
Maintains a professional, energetic and courteous demeanor and appearance when engaging team members on a call or in person.
Must maintain confidentiality and security of entrusted information.
Ability to perform highly detailed and repetitive tasks with a high degree of accuracy (double-checking critical work).
Ability to communicate clearly both orally and in writing conveying technical terminology to non-technical users.
Ability to accommodate flexible hours, including OT and weekends when necessary.
Willing to be part of a fun, energetic and engaging team.
Information Security experience in a financial institution.
Familiarity of IT and information security frameworks such as ITIL, NIST, and COBIT.
Experience in the finance industry.
Acceptable certifications are: CompTIA Security+, CompTIA CASP, CISSP, GIAC, CISM, CEH, CCNA
Incident response experience with forensics knowledge.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Senior Security Analyst
Louisville, KY Certilytics
Senior Infrastructure Engineer - Information S...
Louisville, KY GE Appliances, a Haier company
Security Analyst, Security Intelligence and Vu...
Lexington, KY Oracle
Cyber Security Analyst
Lexington, KY MDI Group - IT Workforce Solutions for Wha...
Senior Infrastructure Engineer - Information S...
Louisville, KY GEA PARTS, LLC