Full-Time

Cyber Threat Incident Response Analyst III

Posted on 1/15/2025

Raymond James Financial

Raymond James Financial

Mid, Senior

St. Petersburg, FL, USA

Requires 2-3 in-office days per week, averaging 10-12 days per month.

Category
Cybersecurity
IT & Security
Required Skills
Bash
Python
Linux/Unix
Data Analysis
Requirements
  • Knowledge of intrusion response and incident management lifecycle and processes.
  • Knowledge of Windows, Linux, memory forensics.
  • Knowledge of Log analysis (endpoint, network, email, cloud).
  • Knowledge of vulnerabilities and comfort in manipulating exploit code for analysis.
  • Knowledge of forensic and analytical techniques.
  • Knowledge of networking and the common network protocols.
  • Demonstrated ability to perform static and dynamic malware analysis.
  • Demonstrated ability to analyze large data sets and identify anomalies.
  • Demonstrated ability to quickly create and deploy countermeasures under pressure.
  • Familiarity with common infrastructure systems that can be used as enforcement points.
  • Basic securities industry information including concepts fundamental to working in the financial/securities industry.
  • Systems administrator experience in Linux, Unix, Windows or OSX operating systems.
  • Demonstrated ability to create complex scripts, develop tools, or automate processes in PowerShell, Python or Bash.
Responsibilities
  • Directs CTC Incident response analysts while contributing to the fulfillment of both the CTC’s mission and leadership’s vision.
  • Ensures continuity of mission between IR shifts.
  • Serves as a primary member of the Cyber Threat Center (CTC) who handles security events and incidents on a daily basis in a fast-paced environment.
  • Acts as an Incident Handler who can handle minor and major security incidents within the defined Computer Security Incident Response process.
  • Maintains situational awareness for cyber threats across the global firm and take action where necessary.
  • Daily responsibilities include, but are not limited to: Countermeasure deployment across various technologies, Malware and exploit analysis, Intrusion monitoring and response, Assessing alerts and notifications of event activity from intrusion detection systems and responding accordingly to the threat, Continuing content development of threat detection and prevention systems, Data analysis and threat research.
  • Assists teams in various security and privacy risk mitigation efforts; including incident response.
  • Conduct forensic investigations for HR, Legal, or incident response-related activities.
  • Develop new forensic detective and investigative capabilities using current technical solutions.
  • Work with various business units and technical disciplines in a security consultant role for cyber threats.
  • Shares in a weekly on-call rotation and acts as an escalation point for managed security services and associates of Raymond James.
  • Implement and contribute to design of disaster recovery and contingency plans to protect company data.
  • Explore and develop a detailed understanding of external developments or emerging issues and contribute to the evaluation of their potential impact on, or usefulness to, the organization.
  • Provide fault isolation and resolution for complex challenges to limit and address issues promptly.
  • Help develop procedures for an area of the organization and monitor their implementation.
  • Develop own capabilities by participating in assessment and development planning activities as well as formal and informal training and coaching; gain or maintain external professional accreditation, where relevant, to improve performance and fulfill personal potential.
  • Manage and integrate emergency response procedures within a location.
Desired Qualifications
  • One or more of the following certifications or the ability to obtain within 1 year: CISSP: Certified Information Systems Security Professional, GXPN – Exploit Researcher and Advanced Penetration Testing, GCIH – Incident Handler, GCIA – Intrusion Analyst, GCFE – Forensic Examiner, GCFA – Forensic Analyst, GNFA – Network Forensic Analyst, GREM – Reverse Engineering Malware.
  • Bachelor’s: Computer and Information Science, Bachelor’s: Information Technology.
Raymond James Financial

Raymond James Financial

View

Company Stage

N/A

Total Funding

N/A

Headquarters

N/A

Founded

N/A