[Close] 

Sr Information Security Analyst - Threat Hunting - Cyber

Auto req ID 190438BR
Job Title Sr Information Security Analyst - Threat Hunting - Cyber
Job Status Full Time
Country UNITED STATES
Province/State Alabama
Colorado
Delaware
District of Columbia
Georgia
Texas
Virginia
City1
Colorado Springs
Washington
Wilmington
Alpharetta
Atlanta
Austin
Montgomery
San Antonio
Alexandria
Vienna
Location
20th & K - Washington
Alexandria/Van Dorn
Austin-1300 S Mopac
Colorado Springs-Remote Location
Vienna
Wilmington - Market Street
Business line TD Bank AMCB
Job Category - Primary Technology Solutions
Job Category(s) Technology Solutions
TD Description
About TD Bank, America's Most Convenient Bank?
TD Bank, America's Most Convenient Bank, is one of the 10 largest banks in the U.S., providing more than 8 million customers with a full range of retail, small business and commercial banking products and services at approximately 1,300 convenient locations throughout the Northeast, Mid-Atlantic, Metro D.C., the Carolinas and Florida. In addition, TD Bank and its subsidiaries offer customized private banking and wealth management services through TD Wealth?, and vehicle financing and dealer commercial services through TD Auto Finance. TD Bank is headquartered in Cherry Hill, N.J. To learn more, visit www.tdbank.com. at http://www.tdbank.com/ Find TD Bank on Facebook at www.facebook.com/TDBank and on Twitter at www.twitter.com/TDBank_US .
TD Bank, America's Most Convenient Bank, is a member of TD Bank Group and a subsidiary of The Toronto-Dominion Bank of Toronto, Canada, a top 10 financial services company in North America. The Toronto-Dominion Bank trades on the New York and Toronto stock exchanges under the ticker symbol "TD". To learn more, visit www.td.com at http://www.td.com/ .
Department Overview
Building a World-Class, Diverse and Inclusive Technology Team at TD
Technology Risk Management and Information Security (TRMIS) is a group of technology, security and risk professionals in Canada, the U.S. and the U.K., focused on managing a comprehensive program to assess, prioritize, and mitigate business risk with technology controls.
The Cyber Security Team is responsible for protecting the Bank, customers and employees by mitigating and identifying technology threats to TD. Development of effective risk management programs help ensure TD?s best-in-class cyber security approach.
What We Stand For
The TRMIS program is continuously evolving to mitigate risks to the bank, including introducing new initiatives and improved defense. With a layered approach to protect customers, employees and the bank from cyber threats, TD manages, challenges and reviews technology controls for all business applications.
About This Role
Reporting to the Senior Manager, Threat Hunting, the Threat Hunting Analyst is responsible for helping the team in the detection, disruption, and the eradication of threat actors from enterprise networks. The Threat Hunting team will use advanced analytics, threat intelligence, and cutting-edge security technologies to participate in threat actor based investigations, create new detection methodologies, and provide subject matter expertise to incident response and monitoring functions. The Threat Hunting Analyst will also directly support the Cyber Security Operations Center and other internal teams by applying analytic and technical skills to investigate intrusions, identify malicious activity, and potential insider threats.
Here's some of what you may be asked to perform:
? Participate in threat hunting operations using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and mitigate threat actors on the network
? Develop advanced methodologies to identify threat actor groups and associated tools, techniques and procedures
? Produce metrics and develop dashboards to identify potential threats, suspicious/anomalous activity, malware, etc.
? Drive the tuning of detection infrastructure with technology teams to identify emerging threats
? Document best practices to enhance analyst playbooks, response procedures, and courses of action
? Support the Cyber Security Operations Center and other internal teams by applying analytic and technical skills to investigate intrusions, identify malicious activity, and potential insider threats
? Provide guidance and/or lead on the development of on-going Information Security risk reporting monitoring key trends and defining metrics to regularly measure control effectiveness
? Proactively review internal processes and activities and identify opportunities for improvement
? Influence behavior to reduce risk and foster a strong information security management culture throughout the enterprise
? Remain informed of emerging issues, industry trends and/or relevant changes to the security landscape
Job Description
About This Role
We are looking for someone to join us as we develop and implement policies, programs and tools related to TD Technology Controls and Information Security. We'll look to you to help provide specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect TD. You may also participate on projects of moderate to high complexity and provide complex reporting, analysis, and assessments at the functional, business line or enterprise level.
Meaningful work is fueled by meaningful performance and career development conversations with your manager. Here are the essential job functions of this position:
+ Guide and advise partners on a broad range of specific Technology Controls and Information Security programs, policies, standards and incidents.
+ Engage in assessments related to risk, controls, implemented control procedures, vulnerability etc..
+ Lead or contribute to risk and control design assessments for an assigned business application, business portfolio, and overall enterprise, as well as risk mitigation and remediation plans and remediation strategy.
+ Actively contribute to the definition, development, and oversight of a global security management strategy and framework.
+ Ensure technology, processes, and governance are in place to monitor, detect, prevent, and react to both current and emerging technology and security threats to TD.
+ Develop on-going technology risk reporting, monitoring key trends and defining metrics to measure control effectiveness for your own area.
+ Apply a teamwork philosophy with technology and partners, service or platform owners to integrate all technology security components and address control gaps.
+ Consult on regulatory compliance requirements, reporting and questions.
+ Provide support and consulting for Audits, help compose management responses and appropriate remediation activities.
+ Participate in computer security incident responses relevant to business (or enterprise wide), represent your respective position to the business while conveying their needs to the incident response team.
+ Adhere to policies, procedures, technology control standards and regulatory guidelines.
+ Contribute to internal activity and process review, flag windows for improvement.
+ Adhere to, advise, oversee, monitor and enforce enterprise frameworks and methodologies related to technology controls / information security activities.
+ Influence behavior to reduce risk, foster a strong technology risk management culture.
+ Define, develop, implement and manage standards, policies, procedures, and solutions that mitigate risk and maximize security, service availability, efficiency and effectiveness.
+ Manage relationships with other technology/business/corporate/control functions.
+ Assess, identify and escalate issues appropriately.
Other duties as assigned
Preferred Requirements
+ At least 3-5 years of previous experience working in hunt teams, threat intelligence, incident response, or security operations
+ Strong working knowledge of security-relevant data, including network protocols, ports and common services, such as TCP/IP network protocols and application layer protocols (e.g. HTTP/S, DNS, FTP, SMTP, Active Directory etc.)
+ A background in Data Science, Statistics, anomaly detection or similar skills would be an asset
Job Requirements
What can you bring to TD? Share your credentials, but your relevant experience and knowledge can be just as likely to get our attention. Here are the minimum requirements for this position:
+ University Degree.
+ Information Security Certification / Accreditation an asset.
+ 5-7 years of relevant experience.
+ Firm commitment to staying informed and abreast of emerging issues, industry trends etc.
+ Advanced knowledge of one or more technology controls or security domains, disciplines and practices.
+ Sound to advanced knowledge of business, technology controls, security and risk issues.
+ Demonstrated ability to participate in projects of moderate to high complexity.
+ Ability and commitment to serve as a subject matter expert on business-specific, cross-functional and enterprise initiatives.
+ Readiness to participate in projects of moderate to high complexity and provide complex reporting, analysis, and assessments at the functional, business line or enterprise level.
Qualifications Preferred Qualifications - Here are the preferred qualifications for this role:
Hours Day Hours
Inclusiveness
At TD, we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. We are dedicated to building a workforce that reflects the diversity of our customers and communities in which we live in and serve, and creating an environment where every employee has the opportunity to reach her/his potential.
If you are a candidate with a disability and need an accommodation to complete the application process, email the TD Bank US Workplace Accommodations Program at USWAPTDO@td.com . Include your full name, best way to reach you, and the accommodation needed to assist you with the application process.
EOE/Minorities/Females/Veterans/Individuals with Disabilities/Sexual Orientation/Gender Identity.
Province/State (Primary) Delaware
City (Primary) Wilmington
ProvState 2 Alabama
City(s) 2 Montgomery
ProvState 3 Colorado
City(s) 3 Colorado Springs
ProvState 4 District of Columbia
City(s) 4 Washington
ProvState 5 Georgia
City(s) 5 Alpharetta
Atlanta
ProvState 6 Texas
City(s) 6 Austin
San Antonio
ProvState 7 Virginia
City(s) 7 Alexandria
Vienna


Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.