Security Analyst (L1)
Date ActiveMay 13, 2021 4:33:20 PM
Hours Per Week40
Location436 Slater Road-HF308
Job Description/ Requirements
Since 1935, Webster Bank has been helping individuals, families and businesses meet their financial goals. As a leading regional bank, Webster's strong foundation is built on our core values of responsibility, respect, teamwork, trust, and commitment to our communities. Webster bankers remain our most asset, and we pride ourselves on our diverse, equitable and inclusive work environment. Come join our team!
The Cybersecurity Analyst (L1) is a hands-on, entry-level but technical role within Webster's Security Operations Center (SOC). As an integral member Webster's Security Operations Center (SOC) team, the Cybersecurity Analyst evaluates the end-to-end efficacy of the SOC's handling of security alerts, and makes recommendations to improve the detection and response capabilities of the SOC. The Cyber Security Analyst will assist with alert review, investigations, incident handling, and assist senior team members with threat hunting initiatives.
This is an entry-level role, but the candidate is expected to demonstrate enthusiasm, drive, and proactive research to security topics. The Cybersecurity Analyst should seek to continuously improve their skills, make recommendations to strengthen Webster’s security stance, and stay current on attacker and defender capabilities.
MAJOR DUTIES & RESPONSIBILITES
The SOC Cybersecurity Analyst will be responsible for evaluating the effectiveness and improving the following technology domains in place at Webster:
o Security Incident and Event Management (SIEM) review.
o Alert triage. o Data Protection Domain: includes DLP, URL Content filtering, CASB.
o Endpoint Threat Detection: includes EDR capabilities, traditional antivirus, asset management, and familiarity with baseline and configuration management tools.
o Next Generation Firewalls and/or IDS/IPS.
o Threat Hunting & Threat Intelligence.
o Threat Intelligence Platforms (TIP).
o Malware sandbox technologies & interpreting results.
o Incident Response tools, process, and capabilities.
o Splunk Enterprise Security experience desired.
o Perform other duties as assigned.
EDUCATION, EXPERIENCE & SKILLS
Bachelor's Degree required
0-3 years working within Cybersecurity field.
Proven technical proficiency in the form of independent research and projects.
Proficiency with the identification, triage, and analysis of security events using a SIEM.
Demonstrated understanding of attacker methodology.