1+ months

SOC Analyst ( 3rd Shift) - P206501_S1

Riverwoods, IL 60015
  • Job Code
\u003Cp\u003EAt Discover, be part of a culture where diversity, teamwork and collaboration reign. Join a company that is just as employee-focused as it is on its customers and is consistently awarded for both. \u003Cstrong\u003EWe\u0027re all about people, and our employees are why Discover is a great place to work. \u003C/strong\u003EBe the reason we help millions of consumers build a brighter financial future and achieve yours along the way with a rewarding career.\u003C/p\u003E\u003Cp\u003EThe Discover Security Analytics \u0026 Incident Detection team is looking for new and qualified security analysts to join our ranks. Our team serves alongside other teams in Information Security as experts in the detection and analysis of all technology-related security incidents. We employ a multitude of enterprise-grade security solutions to achieve our goals. Our primary mission is the timely and accurate identification of incidents, mastery of the technologies and information we analyze, maintaining expert-level knowledge of detection tools and techniques, and proper escalation/hand-off of incidents for response and containment.\u003C/p\u003E\u003Cp\u003E \u003C/p\u003E\u003Cp\u003EWere looking for talented, self-motivated professionals who have a strong passion for information security-- and a burning desire to learn. Were interested in people who enjoy being challenged on a daily basis to stay one step ahead of an ever-changing landscape of threats and adversaries. Were also looking for individuals that are interested in working both collaboratively and independently to hunt down and identify anomalous and malicious activity, wherever it may be. Whether youre a seasoned information security professional or new to the field, were looking for new team members to join us in guarding our enterprise as the last and ultimate line of defense.\u003C/p\u003E\u003Cp\u003E \u003C/p\u003E\u003Cp\u003EResponsibilities include:\u003C/p\u003E\u003Cp\u003E \u003C/p\u003E\u003Cul\u003E\u003Cli\u003EBuilding and maintaining custom security detection logic to analyze and correlate information to produce meaningful, actionable results\u003C/li\u003E\u003Cli\u003EMonitoring of events \u0026 alerts from a multitude of technologies to detect malicious activity\u003C/li\u003E\u003Cli\u003EDetailed analysis using a variety of tools and techniques to investigate, navigate, correlate and understand security incidents to the fullest extent of the data available\u003C/li\u003E\u003Cli\u003ETuning of rules, filters and policies for detection-related security technologies to improve accuracy and visibility\u003C/li\u003E\u003Cli\u003EData mining of log sources to uncover and investigate anomalous activity, along with related items of interest\u003C/li\u003E\u003Cli\u003EMaintaining documentation of logic, rules, policies, and procedures\u003C/li\u003E\u003Cli\u003EProper escalation and hand-off of security incidents for containment and remediation\u003C/li\u003E\u003Cli\u003EPromote a risk-aware culture, ensure efficient and effective risk and compliance management practices by adhering to required standards and processes.\u003C/li\u003E\u003Cli\u003EAnalyzes vulnerabilities, tunes/tests tools, and investigates security incidents to derive useful information in support of system/network vulnerability mitigation, and eliminate false positives. Evaluates vulnerabilities and assess threat severity and impact on corporate assets, including advising technical teams on vulnerability remediation techniques. Contributes to actionable intelligence in the form of reports, notifications, alerts, and briefings. Performs ethical hacking and penetration testing techniques on the perimeter. Supports mitigation and countermeasure strategies from collected threat intelligence. Recognizes security violations and takes appropriate action to report each incident as required.\u003C/li\u003E\u003Cli\u003EIdentifies security issues and/or vulnerabilities and control impact, compromise, or denial of service by applying countermeasures. Performs ongoing assessment of team and program activities to identify opportunities for improvement. Ensures compliance to audit, regulatory, and legal requirements. Builds and maintains effective relationships with peers and internal business partners. Recommends appropriate and effective controls to address security concerns. Must make decisions quickly to implement countermeasures, address remediation, avoid an outage, and ensure system\u0027s high availability.\u003C/li\u003E\u003Cli\u003E\u003Cp\u003EDelivers metrics and performance reporting to enhance real-time risk decision-making and project prioritization. Analyzes data collected from a variety of cyber-defense tools and data-analytics solutions for the purposes of mitigating threats. Engages in reporting risk remediation assurance and automation/integration initiatives, and collaborates with stakeholders, at all levels, to ensure remediation is validated, risk is mitigated, and findings are fully closed/resolved.\u003C/p\u003E\u003C/li\u003E\u003Cli\u003E\u003Cp\u003EMaintains knowledge of security threats and industry trends to provide tactical project guidance. Utilizes Cybersecurity solutions, analyzes events to mitigate risk, and achieve remediation. Works on cyber projects and contributes to delivering key milestones.\u003C/p\u003E\u003C/li\u003E\u003C/ul\u003E \u003C/p\u003E\u003Cp\u003E \u003Cp\u003E \u003Cstrong\u003EMinimum Qualifications\u003C/strong\u003E \u003C/p\u003E\u003Cp\u003E \u003Cstrong\u003EAt a minimum, here\u0027s what we need from you:\u003C/strong\u003E \u003C/p\u003E\u003Cul\u003E\u003Cli\u003E\u003Cp\u003E H.S. Diploma or GED \u003C/p\u003E\u003C/li\u003E\u003C/ul\u003E\u003Cul\u003E\u003Cli\u003E\u003Cp\u003E \u003C/p\u003E\u003C/li\u003E\u003C/ul\u003E \u003C/p\u003E\u003Cp\u003E \u003Cp\u003E \u003Cstrong\u003EPreferred Qualifications\u003C/strong\u003E \u003C/p\u003E\u003Cp\u003E \u003Cstrong\u003EIf we had our say, we\u0027d also look for:\u003C/strong\u003E \u003C/p\u003E\u003Cul\u003E\u003Cli\u003E Bachelor\u0027s Degree in Information Security , Computer Science, Business Administration, Data Analytics, or related field \u003C/li\u003E\u003Cli\u003E 2\u002B years of experience in Information Security, Computer Science, Data Analytics, related certifications. or related field \u003C/li\u003E\u003Cli\u003E PMP, CEH, GIAC \u003C/li\u003E\u003Cli\u003E Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles \u003C/li\u003E\u003Cli\u003E Knowledge of (or a strong desire to learn) common networking services and protocols (TCP/IP, SSH, FTP, DNS, DHCP, SMTP, SSL, etc.) \u003C/li\u003E\u003Cli\u003E Rudimentary understanding of (or a strong desire to learn) common security technologies (IDS, Firewall, SIEM, etc.) \u003C/li\u003E\u003Cli\u003E Exceptional organizational abilities and attention to detail \u003C/li\u003E\u003Cli\u003E The ability to think creatively to find elegant solutions to complex problems \u003C/li\u003E\u003Cli\u003E Excellent verbal and written communication skills \u003C/li\u003E\u003Cli\u003E The desire to work both independently and collaboratively with a larger team \u003C/li\u003E\u003Cli\u003E A willingness to be challenged along with a strong appetite for learning \u003C/li\u003E\u003Cli\u003E The ability to work in a 24x7 shift-based operation \u003C/li\u003E\u003Cli\u003E The flexibility to adjust shift schedule based on the needs of the team \u003C/li\u003E\u003Cli\u003E 1-3 years of experience in Information Security, Incident Response, etc. (or related field) \u003C/li\u003E\u003Cli\u003E Prior experience detecting, analyzing and/or responding to security incidents \u003C/li\u003E\u003Cli\u003E Demonstrated ability to analyze and correlate information from a wide variety of enterprise technologies \u003C/li\u003E\u003Cli\u003E Hands-on experience with common security technologies (IDS, Firewall, SIEM, etc.) \u003C/li\u003E\u003Cli\u003E Knowledge of common security analysis tools \u0026 techniques \u003C/li\u003E\u003Cli\u003E Understanding of common security threats, attack vectors, vulnerabilities and exploits \u003C/li\u003E\u003Cli\u003E Knowledge of data science, data visualization, mathematics, and/or statistics \u003C/li\u003E\u003Cli\u003E Programming experience (Python, Perl, etc.) \u003C/li\u003E\u003Cli\u003E Knowledge of regular expressions \u003C/li\u003E\u003C/ul\u003E\u003Cp\u003E \u003C/p\u003E\u003Cp\u003E Preferred Certifications: \u003C/p\u003E\u003Cp\u003E \u003C/p\u003E\u003Cp\u003E CompTIA Network\u002B/Security\u002B, CISSP, GIAC (GCIA, GCIH, GSEC, GPEN, GREM, etc.), OSCP, CEH, etc. \u003C/p\u003E\u003Cp\u003E \u003Cbr\u003E\u003Cbr\u003E#LI-LJ1\u003C/p\u003E\u003Cp\u003E \u003C/p\u003E \u003C/p\u003E \u003Cp\u003E The same way we treat our employees is how we treat all applicants - with respect. Discover Financial Services is an equal opportunity employer (EEO is the law). We thrive on diversity \u0026 inclusion. You will be treated fairly throughout our recruiting process and without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status in consideration for a career at Discover. \u003C/p\u003E \u003Cbr\u003E\u003Cbr\u003E



  • Banking / Finance
Posted: 2019-08-15 Expires: 2019-12-12

Welcome to Discover
We strive to be the leading direct bank and payments services company. Our mission is to help people spend smarter, manage debt better, and save more to achieve a brighter financial future.

Why Work with Us?
You can make an impact. Whether it’s developing corporate strategy, innovating new services or supporting IT needs, every employee has the opportunity to be a vital part of our business and make a real difference in people’s lives. It’s the heart of what we do.


Employment Trends

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

SOC Analyst ( 3rd Shift) - P206501_S1

Riverwoods, IL 60015

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast