girl looking into her desktop
Back to search results

Threat Reduction Analyst

Addison, Texas

Job Description:

The Threat Reduction Analyst develops and executes evidence-based operations to interdict or mitigate external threats. This includes, but not limited to, counter phishing/ vishing, reporting network attacks, and engaging fraud found on the Internet or social media. Threat Reduction Analysts build and maintain relationships with service providers to ensure timely investigations and stay with every issue until resolution. 

Key Responsibilities:
•             Receives, Investigates, Evaluates, and Actions Cyber Security issues.
•             Provides personalized engagement support to impacted entities within the larger response effort.
•             Prepares detailed case synopsis recording all operational activities.
•             May also provide response services to GIS/Incident Management as needed.
•             Additionally, there’s a significant on-call requirement for this position enabling response to after-hours Cyber Security events.

Key Requirements
•             A broad knowledge of computer networking, log analysis, information security principles, and adversarial tools and techniques.
•             Strong analytical skills/ problem solving/ conceptual thinking.
•             Able to identify, analyze and address problems to resolve issues with minimal negative impact and risk to the organization.
•             Confident and capable written and oral presentation skills.
•             Strong project management skills.
•             Ability to work independently with little oversight managing multiple investigations simultaneously.
•             Must be comfortable in delivering messages across a wide spectrum of individuals having varying degrees of technical understanding.
•             Must have strong leadership skills and qualities which enable you to work with peers and various levels of management.

Desired
•             Bachelor's degree in Information Technology or related field
•             Experience in the remediation of Information Security risks/vulnerabilities
•             Experience with network monitoring and intrusion detection systems
•             Ability to work with Technical and Non-Technical persons
•             Persistent and Logical investigator
 

Enterprise Role Overview - Key individual contributor, with accountability for researching, designing, engineering, implementing, and supporting information security & directory technology systems (software & hardware). Utilizes in-depth technical knowledge and business requirements to design & implement secure solutions to meet customer / client needs while protecting the Bank's assets. Develops and implements security standards, procedures, and guidelines for multiple platforms and diverse environment (e.g. client server, distributed, mainframe, etc.). Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results. Work leadership may be provided by assigning work and resolving problems. Typically 5-7 years of IT experience.

Job Band:

H5

Shift: 

1st shift (United States of America)

Hours Per Week:

40

Weekly Schedule:

Referral Bonus Amount:

0

Job Description:

The Threat Reduction Analyst develops and executes evidence-based operations to interdict or mitigate external threats. This includes, but not limited to, counter phishing/ vishing, reporting network attacks, and engaging fraud found on the Internet or social media. Threat Reduction Analysts build and maintain relationships with service providers to ensure timely investigations and stay with every issue until resolution. 

Key Responsibilities:
•             Receives, Investigates, Evaluates, and Actions Cyber Security issues.
•             Provides personalized engagement support to impacted entities within the larger response effort.
•             Prepares detailed case synopsis recording all operational activities.
•             May also provide response services to GIS/Incident Management as needed.
•             Additionally, there’s a significant on-call requirement for this position enabling response to after-hours Cyber Security events.

Key Requirements
•             A broad knowledge of computer networking, log analysis, information security principles, and adversarial tools and techniques.
•             Strong analytical skills/ problem solving/ conceptual thinking.
•             Able to identify, analyze and address problems to resolve issues with minimal negative impact and risk to the organization.
•             Confident and capable written and oral presentation skills.
•             Strong project management skills.
•             Ability to work independently with little oversight managing multiple investigations simultaneously.
•             Must be comfortable in delivering messages across a wide spectrum of individuals having varying degrees of technical understanding.
•             Must have strong leadership skills and qualities which enable you to work with peers and various levels of management.

Desired
•             Bachelor's degree in Information Technology or related field
•             Experience in the remediation of Information Security risks/vulnerabilities
•             Experience with network monitoring and intrusion detection systems
•             Ability to work with Technical and Non-Technical persons
•             Persistent and Logical investigator
 

Enterprise Role Overview - Key individual contributor, with accountability for researching, designing, engineering, implementing, and supporting information security & directory technology systems (software & hardware). Utilizes in-depth technical knowledge and business requirements to design & implement secure solutions to meet customer / client needs while protecting the Bank's assets. Develops and implements security standards, procedures, and guidelines for multiple platforms and diverse environment (e.g. client server, distributed, mainframe, etc.). Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results. Work leadership may be provided by assigning work and resolving problems. Typically 5-7 years of IT experience.

Shift:

1st shift (United States of America)

Hours Per Week: 

40

Learn more about this role

Full time

JR-22002655

Band: H5

Manages People: No

Travel: No

Manager:

Talent Acquisition Contact:

Michael Maples

Referral Bonus:

0

Street Address

Primary Location:
16001 N DALLAS PKWY, TX, Addison, 75001