- Apie įmonę
The Role / Responsibilities
Moody’s Cyber Security team is looking for a Cybersecurity Analyst to join its growing organization. This position requires a technical background in Information Security practice, experience in IT security investigations and communication skills. The successful candidate is motivated and willing to take on challenges, and has the ability work independently and with minimal oversight.
Moody’s Cyber Security team is responsible for helping the organization balance risk by aligning policies and procedures with Moody’s business requirements. The team is responsible for the development, enforcement and monitoring of security controls, policies and procedures, and for the delivery of security services. Cyber Security team sets strategic direction for security within the organization and aligns with stakeholders throughout the company.
The Cybersecurity Analyst will be responsible for investigating and escalating of alerts which require technical analysis, such as network intrusions and malware infections which have been identified by the Cyber Security team.
• Analyze, correlate and action on data from subscription and public cyber intelligence services, develop tactics to combat future threats, and invoke the Incident Response Plan if necessary.
• Provide timely review of security alerts originating from any source, including managed security services, internal tools, and internal or external reporting.
• Analyze and respond to security events in alignment with the Incident Response Plan and its procedures.
• Perform forensic review of systems in response to incidents or investigations, providing timely and complete reports to management.
• Keep abreast of current security threats, events, technologies, vendors and other aspects of the cyber threat landscape. Propose changes or enhancements to our security posture where appropriate.
• Investigate security incidents and events, using SIEM and other tools; collect evidence and work with teams to isolate and/or remediate as necessary.
• Communicate and escalate incidents to management in accordance with the Incident Response Plan.
• Work with third party security monitoring firms to research and respond to incidents.
• Monitor security tools alerts for anomalous or suspicious activity; research alerts and make recommendations to remediate concerns.
Minimum education and work experience required for this position include:
• At least 2 years of IT industry experience, preferably in a financial services organization.
• At least 1 year experience in security alerts investigation and handling.
• Knowledge and hands-on experience with SIEM technologies and other forensics, evidence collection, and incident remediation tools.
• BS or BA degree, preferably in technology.
• Relevant certifications such as Network+, Security+, CEH, GCIA or GCIH are considered a plus.
• Ability to think with a security mindset. The successful candidate has a strong IT background with knowledge of relevant security practice areas (anti-malware solutions, network security, monitoring, endpoint, etc.).
• Knowledge of security tools which perform functions such as intrusion detection and prevention (IDS/IPS), SOAR, and log archiving.
• Ability to work in a time-sensitive environment; must be detail oriented.
• Written and oral communication skills.
• Ability to work in shifts (24/7).