IT Security Analyst, Specialistother related Employment listings - Birmingham, AL at Geebo

IT Security Analyst, Specialist

A leading U.S. energy company seeks an independent cybersecurity leader to head our existing Cyber Threat Intelligence team. The candidate will directly support the company's efforts to address real and potential cyber threats to the company's facilities, personnel, technology, operations, and brand. The selected candidate will serve as the Team Lead charged with 1) directing the work of the team, 2) advancing capabilities, and 3) coordinating programmatic elements with internal and external stakeholders. The selected candidate will report to a Senior Manager within security operations. Southern Company's Cyber Threat Intelligence team is looking for a lead analyst with extensive experience in investigating and analyzing cyber threats. The team works on proactively understanding the global threat landscape as it manifests on our networks and against our operational assets, informing the company in its responses to these threats. The team works across all business units on the most challenging, complicated, and persistent security risks the company is facing. The potential for impact is substantial and has high visibility within the corporate leadership and governance. The perfect candidate will have a cybersecurity background, with experience in cyber threat analysis, data-driven intelligence reporting, and technology platforms used in commercial Security Operations Centers (SOCs). Highly qualified candidates will possess a professional understanding of nation state operations and motivations and will have previously worked at a multinational company. The successful candidate must be focused on results and a self-starter. JOB
Responsibilities:
Supervise the day-to-day operational work of other intelligence analysts, ensuring they are engaged, productive, and working toward shared goals Working with Senior Manager, establish, track and report on specific measures and initiatives defining individual and team success Lead the identification, investigation, and tracking of cyber actors with the interest and capability to target Southern Company, its employees, vendors, and affiliates Facilitate discussions with internal and external stakeholders to ensure successful sharing of intelligence and completion of initiatives Work with the SOC and security controls teams to develop and implement countermeasures on both the corporate network and operational industrial systems Support proactive threat hunting activities Forecast emerging cyber threat trends Assist the Senior Manager in the development of team members through inclusivity, mentoring, training, and example REQUIREMENTS AND QUALIFICATIONS BA/BS in computer science, technology, engineering or security-related field or equivalent experience Minimum of ten (10) years of relevant professional security experience, or seven (7) years with Master's degree Conversancy with nation state, sophisticated criminal, or supply chain threats Experience investigating and analyzing cyber threats Experience communicating cyber threat assessments Ability to prioritize and execute tasks with nominal oversight Demonstrable experience working across the cyber security community Ability to work with a team spanning multiple locations Proven record of managing and executing short-term and long-term projects Must be willing to obtain and maintain a US government security clearance Advanced knowledge of security principles is desired through achievement of security certifications such as CISSP, GSEC, GCTI, GCIH, OSCP
Salary Range:
$150K -- $200K
Minimum Qualification
IT SecurityEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.