Facebook pixel

Senior Security Product Analyst in Business Technology
Posted on 8/30/2022
INACTIVE
Locations
United States
Experience Level
Entry
Junior
Mid
Senior
Expert
Desired Skills
Bash
Computer Networking
Data Analysis
Linux/Unix
Management
Operating Systems
Snowflake
Splunk
Tableau
Python
Requirements
  • 3-5 years of information security experience (preferred in a larger SaaS enterprise environment)
  • A Bachelor's degree (or advanced degree) in the field of information technology or technical discipline is preferred (an equivalent combination of education and experience from which comparable knowledge and skills may be acquired is also acceptable)
  • Solid understanding of security practices and methodologies, security controls, vulnerability management, penetration testing, and architecture, including the use of firewalls, intrusion detection/prevention, encryption, authentication, and other aspects of defense-in-depth
  • Ability to thrive in a fast-paced environment and prioritize competing priorities, projects, and people
  • Extremely deadline oriented
  • Solid understanding of Windows and Linux operating systems and computer networking
  • Strong verbal/written skills and the ability to effectively interface with internal business clients, operations teams, technical engineering teams, internal audit, regulators, and senior management
  • Intermediate skills with scripting languages not limited to Python, Bash, Go, etc
  • Has strong experience with systems not limited to logging systems like Splunk, SumoLogic, etc, Data Analytics tools like Tableau, Snowflake, etc. Monitoring tools: Nagios, Datadog, etc
Responsibilities
  • As a Business Technology Senior Security Product Analyst, you will be responsible for monitoring security alerts from various security controls implemented in the environment. You will investigate alerts and respond to incidents as necessary
  • Assist or lead in selecting, implementing, and configuring new security tools
  • Develop and implement incident response plans and playbooks
  • Develop and/or refine security monitoring and response procedures
  • In partnership with security to conduct risk assessments, threat analysis, vulnerability analysis, and security controls assessments for the environment
  • Develop plans and implement solutions to mitigate risks in the environment
  • Coordinate with the BT and Security teams to determine solutions, priorities and schedules for remediation work
  • Support BT operations and infrastructure teams with the analysis of operational issues related to security controls and processes
  • Assist in the development and execution of firm-wide disaster recovery plans
  • Analyze the environment for vulnerabilities and risks related to new threats
Okta provides online identity verification solutions.
Company Overview
Okta provides online identity verification solutions.