Job Description

Date Active

May 13, 2021 4:33:20 PM

Requisition #

21-1204

Hours Per Week

40

Location

436 Slater Road-HF308

City

New Britain

State

Connecticut

Job Description/ Requirements

Since 1935, Webster Bank has been helping individuals, families and businesses meet their financial goals. As a leading regional bank, Webster's strong foundation is built on our core values of responsibility, respect, teamwork, trust, and commitment to our communities. Webster bankers remain our most asset, and we pride ourselves on our diverse, equitable and inclusive work environment. Come join our team!

POSITION SUMMARY

The Cybersecurity Analyst (L1) is a hands-on, entry-level but technical role within Webster's Security Operations Center (SOC). As an integral member Webster's Security Operations Center (SOC) team, the Cybersecurity Analyst evaluates the end-to-end efficacy of the SOC's handling of security alerts, and makes recommendations to improve the detection and response capabilities of the SOC. The Cyber Security Analyst will assist with alert review, investigations, incident handling, and assist senior team members with threat hunting initiatives.

This is an entry-level role, but the candidate is expected to demonstrate enthusiasm, drive, and proactive research to security topics. The Cybersecurity Analyst should seek to continuously improve their skills, make recommendations to strengthen Webster’s security stance, and stay current on attacker and defender capabilities.

MAJOR DUTIES & RESPONSIBILITES

The SOC Cybersecurity Analyst will be responsible for evaluating the effectiveness and improving the following technology domains in place at Webster:
o Security Incident and Event Management (SIEM) review.
o Alert triage. o Data Protection Domain: includes DLP, URL Content filtering, CASB.
o Endpoint Threat Detection: includes EDR capabilities, traditional antivirus, asset management, and familiarity with baseline and configuration management tools.
o Next Generation Firewalls and/or IDS/IPS.
o Threat Hunting & Threat Intelligence.
o Threat Intelligence Platforms (TIP).
o Malware sandbox technologies & interpreting results.
o Incident Response tools, process, and capabilities.
o Splunk Enterprise Security experience desired.
Perform other duties as assigned.

EDUCATION, EXPERIENCE & SKILLS

Bachelor's Degree required
0-3 years working within Cybersecurity field.
Proven technical proficiency in the form of independent research and projects.
Proficiency with the identification, triage, and analysis of security events using a SIEM.

Demonstrated understanding of attacker methodology.


#ZR

#LI-FO1



Application Instructions

Please click on the link below to apply for this position. A new window will open and direct you to apply at our corporate careers page. We look forward to hearing from you!

Apply Online