Job Description

If you’re looking for a meaningful career, you’ll find it here at Webster. Founded in 1935, our focus has always been to put people first--doing whatever we can to help individuals, families, businesses and our colleagues achieve their financial goals. As a leading commercial bank, we remain passionate about serving our clients and supporting our communities. Integrity, Collaboration, Accountability, Agility, Respect, Excellence are Webster’s values, these set us apart as a bank and as an employer.  

Come join our team where you can expand your career potential, benefit from our robust development opportunities, and enjoy meaningful work!

The Cybersecurity Analyst (L1) is a hands-on, entry-level but technical role within Webster's Security Operations Center (SOC). As an integral member Webster's Security Operations Center (SOC) team, the Cybersecurity Analyst evaluates the end-to-end efficacy of the SOC's handling of security alerts, and makes recommendations to improve the detection and response capabilities of the SOC. The Cyber Security Analyst will assist with alert review, investigations, incident handling, and assist senior team members with threat hunting initiatives.

This is an entry-level role, but the candidate is expected to demonstrate enthusiasm, drive, and proactive research to security topics. The Cybersecurity Analyst should seek to continuously improve their skills, make recommendations to strengthen Webster's security stance, and stay current on attacker and defender capabilities.


The SOC Cybersecurity Analyst will be responsible for evaluating the effectiveness and improving the following technology domains in place at Webster:

  • Security Incident and Event Management (SIEM) review.
    Alert triage. 
  • Data Protection Domain: includes DLP, URL Content filtering, CASB.
  • Endpoint Threat Detection: includes EDR capabilities, traditional antivirus, asset management, and familiarity with baseline and configuration management tools.
  • Next Generation Firewalls and/or IDS/IPS.
  • Threat Hunting & Threat Intelligence.
  • Threat Intelligence Platforms (TIP).
  • Malware sandbox technologies & interpreting results.
  • Incident Response tools, process, and capabilities.
  • Splunk Enterprise Security experience desired.
  • Perform other duties as assigned.


  • Bachelor's Degree preferred
  • 0-3 years working within Cybersecurity field.
  • Proven technical proficiency in the form of independent research and projects.
  • Proficiency with the identification, triage, and analysis of security events using a SIEM.
  • Demonstrated understanding of attacker methodology.

The estimated salary range for this position is $85,000.00 to $100,000.00. Actual salary may vary up or down depending on job-related factors which may include knowledge, skills, experience, and location. In addition, this position is eligible for incentive compensation.




All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

Application Instructions

Please click on the link below to apply for this position. A new window will open and direct you to apply at our corporate careers page. We look forward to hearing from you!

Apply Online