Monitors cyber threats by leveraging industry standard tools and best practices; collecting, analyzing, and correlating data points between various feeds (for example, network-based, file-based, database, web), tools, and personal interactions; and analyzing data for patterns and link analysis to determine the need for further action.
Supports data security by responding to customer requests, questions, and problems related to data assurance; working problem tickets; ensuring ticket resolution; troubleshooting problems for root causes; reviewing problem resolutions and installation plans according to defined procedures; installing identified changes according to change procedures; developing written intelligence briefings for various levels of stakeholders; and communicating findings and status updates to customers.
Develops, coordinates, and implements Cybersecurity Intelligence system solutions and changes by gathering requirements to support implementations; coordinating with customers and other system areas; evaluating the system environment and supplier products; making recommendations relative to supplier products and services; representing Cybersecurity in divisional councils; researching information about new technologies; developing and reviewing system documentation; reviewing changes before and after product installations; and participating in solution reviews.
Supports Cybersecurity by developing specific expertise; discerning patterns of complex threat actor behavior; and communicating an understanding of current and developing cyber threats.
Leads and participates in team tasks by receiving assignments from experienced team members or project leads; giving updates on assignments; leading in team meetings and discussions; creating and reviewing team documentation; and developing written and oral presentations for diverse audiences (for example, management, customers, suppliers, technical staff).
Minimum Qualifications...Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications.
Minimum Qualifications: Bachelor’s degree in Computer Science, Information Technology, Engineering, Computer Information Systems, or related field and 3 years' experience in information technology or related field within the last 7 years OR 5 years' experience in information technology or related field within the last 7 years. 2 years' experience generating technical reports. 2 years' experience working within a team environment. 2 years' experience with emerging computer or online technologies, online social behaviors, and computer or internet terminology. 2 years' experience with creative writing. 2 years' experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources into written and oral format. 2 years' experience working with MS Office developing macros or using advanced functions. (for example, Vlookup, PivotTables/Charts). 1 year's experience in production support, including problem identification, and customer and vendor relations. 3 years' experience researching current hacking techniques, vulnerability disclosures, data breach incidents, and performing security analysis techniques.
Preferred Qualifications...Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications.
Consumer Software Development, Customer Research, Data Analysis and Insights, Operating System - Windows, Programming Languages, Relational Database Management System (RDMS)