Back to Job Search

Senior Cyber Security Analyst

  • Location: Franklin Park, Illinois, 60131
  • Salary: 130000.0
  • Job Type:Permanent

Posted 13 days ago

MATRIX has partnered with a premier client in filling a unique position.  This is a great opportunity to expand your career and work with a well known company and look towards career growth.

Are you a Certified Cyber Security professional who lives, eats, and breathes Cyber? Do you get excited working within a collaborative team environment? This position may be for you!!!


The Senior Cyber Security Analyst is responsible for managing threats and vulnerabilities in target systems, networks, and applications at an enterprise level. This role is tasked with deploying and operating tools used to identify and mitigate cyber risks across all systems used by the client. The Senior Cyber Security Analyst classifies flaws and weaknesses of IT both on-premise and cloud specific assets that can be exploited to cause business disruption and provides crucial insights into the most pressing security issues with recommendations on how to mitigate those issues.

This role is also responsible for partnering with the managed security services partner in the operation and maintenance of information security systems, frequent review of security logs, security project support, compliance monitoring, incident response and vulnerability management. The ideal candidates will be able to work effectively in a fast-paced setting, bring a fresh perspective to the Security program and be passionate about protecting, defending, and responding to information security related events.

This role does not require to be on-site.

List the essential functions and major activities in order of their importance.
1. Manages processes responsible for the analysis of and response to security threats (malicious code, indicators of compromise, hacker profiling, zero-day exploits, OEM weaknesses, intrusion logging, etc.) in order to proactively prepare for security events.
2. Manage security controls such as phishing defenses, endpoint detection and response, intrusion detection, and SIEM.
3. Response to and triage of level 3 threat alerts sent from MSSP level 1 and 2 analysts, monitor industry resources, threat intelligence, and observe new technical developments, intruder activities and related trends to help identify threats to the business.
4. Conduct vulnerability analysis using vulnerability analysis tools, threat intelligence, as well as agency and industry resources for the latest vulnerabilities and exploits and use a risk-based approach to qualify threats and develop mitigation strategies.
5. Lead incident handling processes, e.g. incident discovery, analysis and verification, incident tracking, containment and recovery, incident response coordination and notification.
6. Perform malware analysis, forensics, and threat modeling.
7. Prepare companywide security advisories and security information bulletins.
8. Develop and document standard operating procedures (SOP) and compile incident reports.
9. Proactive monitoring and response of known and or emerging threats against the network and endpoints.
10. Perform complex data analysis in support of security event management processes.
11. Provide event and anomaly detection which requires long-term analysis and deep dive investigation into internal systems and network activity.
12. Provide analysis and information gathering to provide a situational awareness and actionable intelligence.
13. Strives for continuous improvement and makes recommendations to further mature the security program.
14. Participates cross-functionally across IT and business tiers to provide consultation on complex security issues.
15. Perform web application vulnerability scanning, detection, assessment, and mitigation.
16. Monitor and configure Intrusion detections and prevention systems operations.
17. Maintain information security operational metrics (i.e. # of incidents, types of incidents, etc.).
18. Takes a leadership role in overseeing security issues, projects, and risk management across the enterprise.
19. Partners with key functions (IT, Legal, HR, Finance, and Product) to manage risk across the enterprise.
20. Uses data to make risk-based decisions and leverages skills and experiences to efficiently problem solve.

Education and Experience:
Required:
1. Bachelor’s Degree in MIS or Computer Science preferred, or relevant concentration.
2. Minimum of 5-7 years of overall cyber security and compliance management experience including triaging security and intrusion events.
3. Minimum of 5-7 years of IT Security Testing (e.g., penetration testing, web application security assessments, vulnerability assessments and technical security assessments.
4. Minimum of 5-7 years of cloud, endpoint, server, database, application and network security hardening experience (e.g., design, recommend and implement security hardening technical controls).
5. Possess one or more of the following certifications: CISSP, CISM, CEH, GWAPT, GPEN, GCWN, GCUX, or OSCP.
6. Strong understanding of SIEM, EDR, Threat Intelligence, and IDS technologies.
7. Experience in analyzing logs to correlate threats and adversarial activity.
8. Experience with and comprehensive knowledge of networking (routing, firewalls, load balancing, etc.) and network traffic analysis.
9. Strong analytical, documentation and communication skills.
10. Strong understanding of endpoint (OS), identity (AD), cloud (Azure, Google, AWS), and application (ERP, CRM, Web) technologies.

Preferred:
1. Core understanding of CCPA, GDPR, and other data privacy regulations.
2. Third party risk assessment analysis and review.
3. Legal contract reviews related to cyber security protections with external entities.
4. Phishing training and awareness programs.
5. Leading efforts to develop BIA, BCP, and DR plans.