Description:
The insider threat analyst is responsible for researching, triaging, and investigating anomalous events of concern using Behavior Analytical tools, Splunk SIEM, and other tools to determine potential malicious or risky insider activity. This analyst role will come under the IT Risk and Security department reporting to the Security Operations Manager.
Key Responsibilities:
• Conduct investigations by analyzing and verifying information through various investigative techniques, internal resources, forensics, and Insider threat tools such as Data Loss Prevention, End Point Detection and Response, Network Traffic Analysis & Deceptive Technology to detect malicious lateral movement & privilege escalation in On-prem and Cloud environment.
• Provide actionable Insider threat analysis for remediation on all escalations.
• Triage all Insider Threat alerts within SLA guidelines.
• Collaborate with internal teams to drive insider threat program continuous improvement.
• Assess and make recommendations for improvement and refinement of Use Cases, software tools, and other risk reduction methods used to improve the insider threat program.
• Proven experience using analytical and data visualization tools to automate the analysis and provide insights of large dataset and correlate with Splunk SIEM and other sources of information and conduct investigative works into all traffic anomalies against established, historical baselines to identify the root cause to an incident, reported suspicious events or red teaming activities.
• Stay current with the latest Cyber threats, Attacks and vulnerabilities, and updated with the evolving and emerging attack techniques and methods.
• Maintain and update related insider threat documentations such as IT Standards and Standard Operation Procedures, and carry out activities specified in these documentations.
• Participate in various Cybersecurity exercises such as Cyber Ranges and BCP.
• Work on other project and tasks duties.
Qualifications:
• Minimum of (3) three years direct Information Security experience as an insider threat analyst, or security engineer, or a similar role, preferably with insider threat management experience in a Financial Institution environment.
• Hands on experience with investigative and/or insider threat tools, such as UEBA, DLP, EDR, Computer Forensics, Monitoring, Splunk SIEM, Incident Response, Databases, or data visualization tools in On-prem and Cloud environment.
• Understanding and/or working knowledge of insider threats in the Dark and Deep Web underground forums.
• Strong practical experience in Cyber security: MITRE ATT&CK Framework, Cyber kill chain, TTP, threat intelligence, malware triage.
• Strong understanding of Different Attacks on System, Network, Applications.
• Relevant industry certifications such as Splunk SIEM certification, CERT, CFE, CFCE, CISSP, GCIH, SANS, GIAC.
• Possess strong analytical skills, self-motivated, detail oriented and team player.
• Willing to learn and work in a collaborative manner with peers and team.
• Good interpersonal and communication skill.
• Able to work under pressure during critical situations.
• A passion for information security and data security.