What are the responsibilities and job description for the Cyber Security Analyst II position at SECU?
If you are motivated and believe in the credit union philosophy of "People Helping People," join our team!
Position Overview:
A Security Administrator II is responsible for implementing, managing, and optimizing Security Information and Event Management (SIEM) solutions to enhance an organization's cybersecurity posture. This role involves monitoring security alerts, analyzing security incidents, and collaborating with other IT and security teams to ensure effective threat detection and response. The Security Administrator II also develops and fine-tunes correlation rules and reports to mitigate risks and improve overall security operations.
Essential Responsibilities:
Disclaimer
State Employees' Credit Union reserves the right to fill this role at a higher/lower level based on business need.
Position Overview:
A Security Administrator II is responsible for implementing, managing, and optimizing Security Information and Event Management (SIEM) solutions to enhance an organization's cybersecurity posture. This role involves monitoring security alerts, analyzing security incidents, and collaborating with other IT and security teams to ensure effective threat detection and response. The Security Administrator II also develops and fine-tunes correlation rules and reports to mitigate risks and improve overall security operations.
Essential Responsibilities:
- (25 %) Design, implement, and maintain the systems and infrastructure that support the SOC, including SIEM (Security Information and Event Management) systems, log management systems, and other security tools.
- (20 %) Design and develop use cases that align with the organization's security goals and objectives, focusing on the detection and response to security incidents.
- (20 %) Create and maintain a library of use cases that cover a wide range of security scenarios, including insider threats, malware infections, network intrusions, and data breaches.
- (20 %) Analyze running processes and configurations on affected systems to understand the impact and potential damage caused by the attack.
- (10 %) Document use case design, implementation, and performance metrics for reporting and auditing purposes.
- (5 %) Stay up to date with the latest security threats, vulnerabilities, and industry best practices to continuously improve the organization's security posture.
- HS Diploma or GED
- Relevant certifications, such as the EC-Council's Certified SOC Analyst (CSA) or advanced certifications like Certified Ethical Hacker (CEH), are highly valued.
- 2 – 4 Years previous experience as a SOC/SIEM Engineer or similar role, with a strong track record of successfully investigating and responding to critical security incidents.
- 2 – 4 Year University with the Information Security field of study.
- Relevant certifications, such as the EC-Council's Certified SOC Analyst (CSA) or advanced certifications like Certified Information Systems Security Professional (CISSP), are highly valued.
- 3 – 5 Years previous experience as a Tier 3 SOC Analyst or similar role, with a strong track record of successfully investigating and responding to critical security incidents.
- Hybrid expectations
- Work from Home expectations.
Disclaimer
State Employees' Credit Union reserves the right to fill this role at a higher/lower level based on business need.