Sr. Cybersecurity Analyst
Sr. Cybersecurity Analyst
03/15/2023 ● Scottsdale, Arizona ● Direct Hire
Job Title: Sr. Cybersecurity Analyst
Duration: Perm
Location: Remote in Phoenix, Arizona
Definition: Under general supervision of the Cyber Security Manager, assumes responsibility for the implementation and maintenance of security processes and technology improvements in support of the organization’s Cyber security Strategic Plan. Works cohesively with the IT teams and divisions to conduct risk assessments, administer and audit security systems. As a member of the security team develops, implements and maintains security architecture design and maintains the technologies and processes that support continuous security improvements. This job class is treated as FLSA Exempt.
Essential Functions: Essential functions may vary among positions and may include the following tasks and other characteristics. This list of tasks is ILLUSTRATIVE ONLY and is not intended to be comprehensive listing of tasks performed by all positions in this classification.
Tasks:
- Mentoring: Mentors security team staff so they attain the technical skills and customer service skills along with experience necessary to perform independently and attain further career progression goals.
- Ensures cross functional training of staff to ensure that primary and secondary support personnel are properly trained to support division services.
- Assists with the routine supervision of assigned staff. Prioritizes and coordinates staff workflow and provides training and assistance as needed.
- Helps establish criteria for employee performance evaluations based on division and department goals and objectives.
- Helps prioritize and coordinate staff workflow and provides training and assistance as needed.
- Provides senior leadership to the Security Team staff and works closely with other IT divisions to establish and enforce IT standards. Evaluates and recommends best in class standards and processes.
- Network Security Support: Proactively audits and reviews the network and security infrastructure.
- Ensures that scheduled maintenance, patching and performance is monitoring and managed.
- Monitors LAN/WAN, network, security firewalls, routers and systems to ensure security standards are maintained.
- Support key team members for incident management of all network security-related issues.
- Provides operational reporting that effectively communicates the security posture of the Company organization.
- Provides technical input and assistance to troubleshoot security issues.
- Security Risk Assessments: Develops and implements security, technology and assessments based on the organization’s selected security framework.
- Develops and maintains adopted security standards and industry best practices.
- Works closely with internal stakeholders and security leadership to build and maintain an effective security program to protect the confidentiality, integrity and availability of IT assets to help mitigate overall organizational risks.
- Investigation Support: Responds to security breaches or personnel investigation requests.
- Ensures accurate data capture, chain of custody and reporting for an incident or investigation.
- Provides leadership, consultation or technical support.
- Maintains confidentiality and integrity of systems, data and security processes.
- Vendor Management: Maintains relationships with vendors and consultants to ensure security standards and deliverables are met.
- Manages security vendors to ensure Community projects and objectives are met.
- Documentation: Establishes, maintains and enforces IT Department policies and procedures in collaboration with IT management team.
- Recognizes and identifies potential areas where existing policies and procedures require change, or where new ones need to be developed.
- Develops and implements security operational policies and procedures.
- Project Coordinator and SME
- Fulfills all duties as the Cyber Security subject matter expert in support of IT and external departmental projects
- Fulfills all duties as the Cyber Security subject matter expert in support of 3rd party audit engagements
- Leads Cyber Security team projects and initiatives to include security tool integrations, tool evaluations, and process improvements
Knowledge, Skills, Abilities and Other Characteristics:
- Ability to assess security vulnerabilities at the system and/or network level.
- Ability to coordinate vulnerability mitigation efforts across multiple teams
- Ability to asses social engineering risks related to electronic communications
- Ability to asses and document risk related to third party system and/or software integrations
- Ability to conduct/ support Information Assurance training to broad user base
- Ability to manage and leverage security tools to reduce organizational risk
- Ability to lead and coordinate team level projects and programs with little to no oversight
- Ability to work independently and make well informed decisions based on experience and data gathering
- Ability to serve as the go to cyber security authority in the absence of the Cyber Security Manager.
- Knowledge of Firewall logs and the use of those logs for investigative practices
- Knowledge of the Elastic Stack and the ability to leveraging multiple log sources to identify security risk and/or compromise
- Knowledge of software and system vulnerabilities and mitigation practices
- Knowledge of secure protocols and how, when, and where they should be implemented
- Knowledge of Microsoft 365 Cloud security suites to include: 365 Defender, Purview/Compliance
- Knowledge of two factor authentication and its integration types
- Knowledge of industry data classification standards i.e.: HIPAA, PCI, PII, and PHI
- Knowledge of CIS, NIST and FedRamp controls/standards.
- Skilled at providing outstanding internal and external customer service.
- Skilled at interfacing at all staff levels and providing effective verbal and written communication.
- Skilled at verbal & written communication.
- Skilled at defining issues, analyzing and evaluating information, presenting recommendations and identifying alternative solutions.
- Ability to work effectively across and within diverse teams.
- Ability to effectively manage simultaneous security issues.
- Ability to effectively manage network security related change and requirements gathering
- Highly self-motivated and directed combined with extensive experience working in a collaborative, team-oriented environment.
Qualifications:
- Education: A Bachelor’s degree from an accredited college or university in Information Security, Cyber Security or related discipline. A combination of 7 years direct cyber security experience and industry certifications maybe be accepted in lieu of degree.
- Desired Experience:
- Five (5) years’ experience with the following:
- Direct experience working within an IT/Cyber security role, hands-on network security implementation experience, security monitoring, cloud security monitoring, or vulnerability management.
- Direct experience supporting Microsoft 365 Cloud security
- Direct experience with the Elastic log management platform
- Direct experience supporting cyber security incident response
- Direct experience managing and/or mitigating software and system vulnerabilities
- Direct experience conducting security audits to include: access control and system configuration
- Direct experience conducting security assessment on 3rd party integrations
- Direct experience with secure remote access technologies
- One of the following certifications is required:
- Security +
- Systems Security Certified Practitioner (SSCP®)
- Certified Information Systems Security Professional (CISSP)
- Two of the following certifications is preferred:
- Security +
- Systems Security Certified Practitioner (SSCP®)
- Certified Information Systems Security Professional (CISSP)
- Certified Information Security Manager (CISM)
- SANS Global Information Assurance Certifications (GIAC)
- Certified Ethical Hacker (CEH)
- EnCase® Certified Examiner (EnCE®)
- Equivalency: Equivalent combinations of education and experience that will allow the applicant to satisfactorily perform the duties of the job may be considered.