My Shortlist

Your shortlisted jobs will appear here. To view your shortlist: Login Or Register

More Jobs Like This
Date Added: Wed 02/06/2021

Sr. Security Threat Analyst

Jacksonville, FL, US
Add To Shortlist Apply Now


Job Type: Permanent, FullTime

Position Details Role Sr. Security Threat Analyst Duration 5 months Location Jacksonville (can work 100 remote) Job Description The IT Security Threat Analyst independently develops, maintains, and implements comprehensive information security monitoring programs including defining security policies, processes and standards for large and complex environments. Perform comprehensive threat analysis and recommends appropriate course of action, mitigation, and remediation. Provide consultative guidance on the development of information security strategies and programs through demonstrated expertise and knowledge of industry trends and changes with respect to advanced and sophisticated cyberattacks and threats. Lead efforts, oversee work results, provide formal training and serve as a technical resource for Information Security team members. They are the single point of contact and coordination for third-party incident response teams and law enforcement agencies if the environment is breached. Essential Functions bull The essential functions listed represent the major duties of this role, additional duties may be assigned. bull Independently, proactively and automatically correlates and analyzes threat data from various sources and analyzes network events to establish the identity and modus operandi of malicious users active in the computing environment or posing potential threats to the computing environment. Provides guidance and assistance to junior members of the team bull Independently conducts industry research and technical evaluation of all-sources and vendor supplied intelligence--with specific emphasis on network operations and advanced and sophisticated cyber tactics, techniques, and procedures bull Subject matter expert in the detection and identification of cyberattack signatures, tactics, techniques and procedures associated with advanced threats bull Leads assessments and development of cyber threat profiles of current events based on collection, research and analysis of open source information bull Leads root cause analysis of any monitoring alerts and threats identified by third-party vendor, or internal systems and workforce. Once root cause is determined, proposes and leads cross-departmental efforts, if required, to implement appropriate security controls and solutions that will mitigate risk and vulnerabilities, as well as safeguard our systems and data bull Independently and proactively prepares detailed technical papers, presentations, recommendations, and findings for Management and other Technology Leaders bull Develops and maintains documentation for security monitoring procedures and security diagrams bull Leads the development of proposed design, configuration, and implementation of security monitoring architecture bull Serve as a subject matter expert for team members, specializing in network security monitoring, host analysis, and log analysis bull Creates and leads initiatives to improve security monitoring operations center processes bull Leads improvements discussions with third-party vendor regarding security monitoring functions bull Proactively identifies company-wide program opportunities and works to implement solutions. Guides the direction of the overall information security monitoring and threat analysis program Required Work Experience 6+ years related work experience. Experience Details IT Security Required Education Related Bachelor's degree or additional related equivalent work experience IT related field Additional Required Qualifications Demonstrated proficiencies in emerging technologies. Strong technical knowledge of security architecture, tools and controls with specific demonstrated experience in proactive detection, mitigation, and resolution of advanced cyberattacks andor threats Strong technical knowledge of security infrastructure including security firewalls, data loss prevention, encryption, and end point protection appliances In-depth knowledge of information threat analysis and detection concepts and principles and impact Experience working and managing vendor performance and service level agreements Proven leadership abilities including effective knowledge sharing, conflict resolution, facilitation of open discussions, fairness and displaying appropriate levels of assertiveness. Proven ability to work under stress in emergencies with flexibility to handle multiple high-pressure situations simultaneously. Ability to communicate highly complex technical information clearly and articulately for all levels and audiences. Ability to manage tasks independently and take ownership of responsibilities Ability to learn from mistakes and apply constructive feedback to improve performance Strong customer focus with ability to manage customer expectations and experience and build long-term relationships. Strong team-oriented interpersonal skills with the ability to interface with a broad range of people and roles including vendors and IT-business personnel. Ability to adapt to a rapidly changing environment and quickly identify new trends and industry changes specific to security and advanced cyberattacks High critical thinking skills required to evaluate complex, multi-sourced security intelligence information, analyze and confirm root cause, an independently identify mitigation alternatives and solutions that safeguard our technical environment. Preferred Licenses and Certifications CISSP - Cert Information Systems Security Prof Or CEH, CISM, CRISC, etc Additional Preferred Qualifications bull3-5 years of Cyber Operations, Threat Hunting, Investigations, Threat Intelligence and Analysis experience bullExperience using Agile methodology EEO Employer Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at or
Apply Now