Job Profile Summary - Use skills, experience and talent to help Key grow their information security program by analyzing, assessing, and helping mitigate security issues.
- Applicant will use defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threat. Use data collected from a variety of cyber defense tools to analyze events that occur within environment for the purposes of mitigating threats.
- Applicant must have a technical background across a wide range of security disciplines and solutions and must have excellent presentation, writing, communication, and customer interface skills.
*This position will be Monday - Friday, 1:00pm - 10:00pmEssential job FunctionsAbilities:
- Apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
- Interpret the information collected by network and/or security tools.
Knowledge of:
- Cyber defense and information security policies, procedures, and regulations.
- Incident response and handling methodologies to include escalation with stakeholders.
- Cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- System and application security threats and vulnerabilities.
- OSI model and underlying network protocols across multiple operating systems types.
Skills:
- Speaking with others to convey information effectively
- Decision making considering the relative costs and benefits of potential actions
Tasks:
- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
- Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
- Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
- Document and escalate incidents that may cause ongoing and immediate impact to the environment.
- Perform cyber defense trend analysis and reporting.
Required Qualifications- Bachelor’s degree or equivalent work experience (Cybersecurity or Computer Science major preferred).
- Professional security certification desired (CISSP, CISM, CISA, etc.).
- Basic understanding of security threats and knowledge of financial industry.
- Strong risk-based analysis and decision-making skills.
- Proven ability to identify and implement process improvement opportunities.
- Results oriented, a team player, and self-starter with ability to work with general direction.
- Ability to manage competing priorities.
FLSA STATUS:Exempt
KeyCorp is an Equal Opportunity and Affirmative Action Employer committed to engaging a diverse workforce and sustaining an inclusive culture. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.
46504BR