Information Security Analyst Information Technology (IT) - Charlotte, NC at Geebo

Information Security Analyst

Information Security Analyst Position Summary Information Security Analyst We seek an Information Security Analyst to join our growing team and help improve our detection capabilities here at Belk.
We're looking for someone to help us improve the systems and processes needed to detect and act on potential malicious behavior across the Belk environment.
You will maintain and help develop our SIEM and alerting pipeline and the development of alerts and other detection capabilities.
You should be a quick learner, a self-starter, and excited to hit the ground running.
Your passion for security, detection, threat hunting, and creative problem-solving will be crucial to your success in this role.
This role is fully remote with quarterly travel to Belk, Inc.
headquarters and must be worked in the ET time zone.
This role will report to the Manager, Cybersecurity Operations & Incident Response.
Essential Duties and Responsibilities The Information Security Analyst role involves conducting basic threat detection and incident response activities to maintain Belk's security posture.
Actively monitor and investigate security alerts to detect malicious activities.
Provides initial triage for discovered issues, escalates as needed, and contributes to larger incident response efforts when required.
Create high-confidence security monitoring content consisting of dashboards and alerts within SIEM and other network security tools (Hybrid/Cloud) to detect threats, suspicious activities, and potential incidents and aid in analytical investigations.
Continuously evaluate and optimize custom and OOTB (out of the box) detection content monitoring various on-prem and cloud service provider environments in support of SOC operations.
Troubleshoot issues in production and other test and development environments, applying debugging and problem-solving methodologies (e.
g.
, log analysis, non-invasive tests).
Conduct independent critical thinking to diagnose and analyze threat intelligence data, latest threats, attack vectors, tactics, techniques, and procedures (TTPs) to decide on the most effective response and remediation strategies through content development.
Perform analysis of log files from various sources (e.
g.
, individual host logs, network traffic logs, firewall logs, and intrusion detection system IDS logs) to identify possible threats and vulnerabilities impacting the Belk organization.
Continuously execute timely and effective communication across team and management channels regarding tasks completed, roadblocks experienced, and process improvement opportunities identified.
Keeps management informed with precise, unvarnished information about security posture and events.
Promotes standards-based workflow both internally and in coordinating with US-CERT A high level of confidentiality and professionalism is required.
Requirements Preferred 2
years IT security experience Preferred 1
years' experience in network traffic analysis Strong working knowledge of:
TCP/IP Fundamentals Network Level Exploits Strong understanding of IDS/IPS technologies, trends, vendors, processes, methodologies, architectures, implementations, signatures, content creation, and signature characteristics, including both signature and anomaly-based analysis and detection.
Some experience with system hardening guidance and tools Desired Skills:
Experience developing queries, data models, and dashboards.
Cloud monitoring experience is a plus.
Must be highly motivated and able to self-start, prioritize, multi-task, and work in a team setting.
Security documentation experience (DIACAP/RMF) Required Education:
Bachelor of Science Degree with a major in Computer Science/Computer Engineering, Engineering, Science, or a related field.
Two years of related work experience may be substituted for each year of degree-level education.
Certifications (one or more is desired):
Security+, CEH, CC (Certified in Cybersecurity), GSEC, GCIH, GCFA, GCIA, CCNA, or similar #LI-REMOTE #IND3 #LI-CR1 Recommended Skills Business Process Improvement Communication Computer Engineering Computer Networks Computer Security Confidentiality Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.