Cyber Analyst III

Overview

On Site
Full Time

Skills

Incident Management
Soft Skills
Leadership
SIEM
Malware Analysis
Data Loss Prevention
Information Security
Business Process
Mentorship
Network
Firewall
Cisco
Partnership
Privacy
Continuous Improvement
Decision-making
Cyber Security
Data Security
Management
Supervision
Effective Communication
Finance
Policies and Procedures
OFAC
Reporting
Regulatory Compliance
Training
Military
Law

Job Details

We do the right things, right now. We do them in a way that is relevant to our clients. Become a part of our history as it continues to be written!

If you are interested and qualified for this role, we invite you to apply.

The Cyber Analyst provides leadership for cyber incident response and cyber security protection across First Financial Bank. This role needs experience within the Information Security discipline including monitoring networks for security issues, investigating security breaches, and developing company-wide best practices for cyber security. The Cyber Analyst is responsible for strengthening the company's cyber threat management capabilities by leveraging technical and soft skills to promote a robust security mindset across the company. This role interacts with multiple levels of the organization, including senior leadership, and it is fundamental in cultivating the company's cybersecurity culture.

Essential Functions/Responsibilities
  • Helps with the use of monitoring tools, SIEM (Security Incident Event Monitoring) to carefully examine network traffic and to identify both external and internal threats.
  • Assists in detailing and analyzing current events, threat actors, campaigns, tactics, techniques, and procedures (TTPs), and malware to summarize information, identify patterns, and understand potential impact related to our current risk posture.
  • Provides written summaries of findings and document recommended actions in both executive summaries as well as detailed technical reports for system owners.
  • Assists with the development of strategic recommendations on the development and implementation of threat management projects.
  • Based on cyber security policy, assists with the development of rules to identify, detect, and respond to cyber security incidents.
  • Helps with the development of cyber security policies.
  • Understand how associates use data and information across the organization to optimize the company's cyber security posture.
  • Helps build and champion a company-wide culture around cyber security.
  • Participates in the company's continuous improvement around threat management and ensure the company is staying up to date with the latest technical advances.
  • Enforces data loss prevention policies across the company using technical preventive controls.

Minimum Knowledge, Skills, and Abilities Needed to Perform Essential Functions of the Job
  • 5 years of Information Security experience.
  • Ability to work with multiple lines of business at all levels of the organization, including the ability to learn and understand business process.
  • Comprehensive knowledge of threat management techniques including how to monitor, detect, and respond to cyber security incidents.
  • Ability to train and mentor others in multiple security domains.
  • Strong knowledge of and proven experience with:
    • Endpoint Detection and Response (EDR) technologies
    • Web Gateway technologies
    • Email protection technologies
    • Email protection technologies
    • Network & firewall technologies (CISCO).
    • MITRE Attack framework and methodology
  • Ability to:
    • Build partnerships with line of business leaders
    • Consult, provide guidance, and communicate effectively with internal partners.
    • Influence policies and procedures within lines of business which provide for a better cyber security and posture.
    • Help build and champion a company wide culture around cyber security.

Preferred Knowledge and Skills
  • Bachelor's degree.
  • Beginner knowledge of privacy laws (e.g. GDPR and CCPA).

Level of Complexity and Scope
  • Solves complex problems by working directly with the lines of business to protect cyber resources and data.
  • Recommends creative solutions based on technical expertise and analysis.
  • Determines projects and policies to drive continuous improvement

Degree of Independence and Decision-Making
  • Collaborates across the company on cyber security and data protection initiatives with limited guidance from management.
  • Self-starter, works independently with minimal supervision.
  • Independent time management, organization, and prioritization.

Required Supervisory Responsibilities
  • None

Physical Requirements
  • Prolonged periods of deskwork.
  • Frequent use of computer, keyboard, phone and office equipment.
  • Occasional moving within the office or to other locations within the building.
  • Occasionally lifting and carrying light objects, typically up to 10-15 pounds.
  • Clear and effective communication in person and over the phone.

Compliance Statement

The associate is responsible for meeting all compliance requirements imposed on First Financial Bank by State and Federal law and regulation, as well as all related First Financial Bank policies and procedures. This includes all Bank Secrecy Act, Anti-Money Laundering, OFAC and Suspicious Activity reporting requirements, as well as all other lending and deposit compliance requirements.

Development and Training

Benefits

We have relevant, thoughtful benefits and programs that support every aspect of our associates' holistic wellbeing. Please review our Benefits Guide.

Incentive Eligibility

All roles are incentive eligible with the exception of Co-Op, Intern, or Student positions.

It is our policy to not discriminate against any individual in violation of federal, state, and local laws as it relates to age, race, color, religion, national origin, sex, marital status, pregnancy, gender identity, disability, sexual orientation, genetic information, veteran/military service, or any other characteristic protected by law.

We are an E-Verify Employer.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.