Demo

Cybersecurity Threat & Vulnerability Analyst

Duke Energy
Hybrid remote in Charlotte, NC Full Time
POSTED ON 4/27/2022 CLOSED ON 5/21/2022

What are the responsibilities and job description for the Cybersecurity Threat & Vulnerability Analyst position at Duke Energy?

More than a career - a chance to make a difference in people's lives.

Build an exciting, rewarding career with us – help us make a difference for millions of people every day. Consider joining the Duke Energy team, where you'll find a friendly work environment, opportunities for growth and development, recognition for your work, and competitive pay and benefits.

Position Summary


The Cybersecurity Threat and Vulnerability Analyst is responsible for identifying, analyzing, prioritizing, and eradicating cyber threats and vulnerabilities across the Duke Energy environment. The Analyst will analyze threat information and work closely with peers, other internal/external teams and management to ensure that information is properly disseminated to appropriate parties for action. The Analyst assists with supporting tools which perform vulnerability scanning, configuration monitoring, and Open Source Intelligence analysis. The Analyst also is responsible for following processes and procedures as defined by Cybersecurity leadership and the Threat & Vulnerability Management team.

Responsibilities

  • Thoroughly research and analyze emerging cyber threats and vulnerabilities, including those specific to ICS environments, distributing relevant information to impacted business areas to increase prevention and response capabilities.

  • Track cyber threat actors/campaigns and techniques, tactics, and procedures based off technical analysis from government feeds and open source/third party intelligence.

  • Prepare written analysis of cyber threats, campaigns, and threat actor groups.

  • Respond to requests for ad-hoc reporting and research regarding cyber threat actors, campaigns, and associated tactics, techniques, and procedures

  • Provide subject matter expertise to the development of cyber operations specific indicators

  • Monitor and report on relevant threat activities and changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.

  • Leverage tools and manual methods to perform public, deep and dark web searches for threats impacting Duke Energy

  • Monitor open source websites for hostile content directed towards organizational or partner interests.

  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.

  • Develop and improve processes and metrics to advance and mature the threat and vulnerability management function

  • Look for opportunities to improve the threat & vulnerability management function and promote best practices for remediating cyber threats and vulnerabilities

  • Communicate and report on key intelligence, analysis and response activities, relevant metrics, and KPIs.

  • Request and track mitigations to address cyber threats and support other coordination and remediation activities.

  • Participate in response efforts, including afterhours events, to emergent cyber threats, providing relevant threat and vulnerability analysis information.

  • Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.

  • Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).

  • Utilize off-the-shelf or open source vulnerability scanning technologies to evaluate the security posture of information systems and applications.

  • Assist with performing risk assessments of identified vulnerabilities to determine and communicate necessary response actions required based on assessed level of threat.

  • Assist with developing risk mitigation strategies to resolve vulnerabilities and recommend security changes to system or system components as needed.

  • Provide technical support for tools which perform vulnerability analysis or configuration monitoring.

  • Troubleshoot identified technical issues with tools and technologies and apply patches and perform upgrades.

  • Work with application end users and other support personnel to troubleshoot and resolve identified issues.

  • Develop and maintain comprehensive technical, process, and administrative documentation.

  • Perform routine compliance reviews for in-scope devices as required by NERC CIP regulations.

  • Configure and maintain reports, rules, tasks, jobs, and objects within vulnerability and integrity management applications to promote compliance with NERC CIP regulatory requirements.

  • Assist with gathering evidence and responding to internal or external regulatory requests.

Required/Basic Qualifications

  • Bachelors degree in Managing Information Strategies (MIS), Cybersecurity, Computer Science, or related discipline

  • In addition to required degree, two (2) years minimum of related work experience

  • In lieu of Bachelors degree(s) AND 2 year(s) related work experience listed above, High School/GED AND 6 year(s) related work experience

Desired Qualifications

  • CISA and/or CISSP and/or EC-Council Certified Ethical Hacker and/or GCIH and/or GIAC and/or GCIA and/or GCFA

  • Experience in Cybersecurity, preferably with performing research on cyber threats and vulnerabilities and utilizing vulnerability assessment tools.

  • Experience researching and assessing cyber threats and vulnerabilities

  • Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.)

  • Knowledge of cyber intelligence/information collection capabilities and repositories.

  • Knowledge of cybersecurity domains, security practices, and cyber defense models, such as the Cyber Kill Chain® methodology & MITRE's ATT&CK Framework®

  • Knowledge of telecommunications fundamentals and common networking and routing.

  • Knowledge of general networking understanding and/or experience to include Understanding of TCP/IP communications & knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB

  • Knowledge of intelligence disciplines

  • Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions

  • Ability to utilize multiple intelligence sources across all intelligence disciplines

  • Windows and UNIX/Linux command line scripting experience and programming experience (Python, Powershell, etc).

  • Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on threats and vulnerabilities and provide briefings to various levels of staff / management.

  • Ability to function effectively in a dynamic, fast paced environment

  • Ability to research independently, multi-task, and meet deadlines under tight timeframes

  • Ability to develop and maintain good working relationships with internal and external business partners

  • Experience with writing and editing technical documentation and operational procedures

  • Experience in developing and improving work processes

  • Demonstrated effective problem solving & analytical skills

  • Knowledgeable of Duke Energy’s Cybersecurity policies

  • Innovative – ability to recognize and seek improvement and efficiency opportunities

  • Demonstrated commitment to training, self-study and maintaining proficiency in the technical cybersecurity domain.

Working Conditions

  • Office Environment

  • Hybrid – Work will be performed from both remote and onsite locations after the onboarding period. However, hybrid employees should live within a reasonable commute to the designated Duke Energy facility.

#LI-RB1

#LI-hybrid

#hybrid

Travel Requirements

Not required

Relocation Assistance Provided (as applicable)

No

Represented/Union Position

No

Visa Sponsored Position

No

Posting Expiration Date

Friday, April 29, 2022

All job postings expire at 12:01 AM on the posting expiration date.

Please note that in order to be considered for this position, you must possess all of the basic/required qualifications.

Privacy

Do Not Sell My Personal Information (CA)

Terms of Use

Accessibility

Cybersecurity - Manager - Threat & Vulnerability Management
EY -
Sacramento, CA
Cybersecurity - Manager - Threat & Vulnerability Management
EY -
Seattle, WA
Cybersecurity - Manager - Threat & Vulnerability Management
EY -
Toledo, OH

If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

Sign up to receive alerts about other jobs with skills like those required for the Cybersecurity Threat & Vulnerability Analyst.

Click the checkbox next to the jobs that you are interested in.

  • Cybersecurity Skill

    • Income Estimation: $87,466 - $114,731
    • Income Estimation: $99,793 - $130,112
  • Endpoint Protection Skill

    • Income Estimation: $86,628 - $131,378
    • Income Estimation: $112,673 - $137,290
This job has expired.
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at Duke Energy

Duke Energy
Hired Organization Address Charlotte, NC Full Time
Responsibilities The LS Rep I is responsible for managing those often competing uses in accordance with established poli...
Duke Energy
Hired Organization Address Asheville, NC Intern
Responsibilities Develops understanding of the fundamentals of relaying, protective schemes, controls, alarms, distribut...
Duke Energy
Hired Organization Address Raleigh, NC Intern
Responsibilities Develops understanding of the fundamentals of relaying, protective schemes, controls, alarms, distribut...
Duke Energy
Hired Organization Address Greensboro, NC Intern
Responsibilities Develops understanding of the fundamentals of relaying, protective schemes, controls, alarms, distribut...

Not the job you're looking for? Here are some other Cybersecurity Threat & Vulnerability Analyst jobs in the Hybrid remote in Charlotte, NC area that may be a better fit.

Senior Cybersecurity Analyst - Threat and Vulnerability Management

Public Company Accounting Oversight Board, Ashburn, VA

AI Assistant is available now!

Feel free to start your new journey!