SOC Analyst I monitoring and responding to cybersecurity threats for Byline Bank. Assisting in protecting customer and business information with compliance and real-time threat management.
Responsibilities
Responsible for helping the Information Security Operations Manager in protecting the confidentiality and integrity of customers, employees, and business information in compliance with organization policies and standards.
Focus on monitoring, detecting, and responding to cybersecurity threats in real-time.
Ensures compliance with Information Security program, policies, procedures, guidelines, and standards.
Assists with the maintenance and testing of the Disaster Recovery and Business Continuity Plans.
Monitor SIEM dashboards, investigate alerts, and escalate incidents as per SOC procedures.
Document incident response actions and maintain accurate SOC logs for compliance.
Respond to security-related events to invoke operational/security responses and/or actions as needed.
Participates in risk assessments to identify and assess security risks of new, existing, or proposed infrastructure.
Analyzes security incidents and assists in the escalation of security events in conjunction with the Bank Incident Response Plan.
Advises management on potential new threats, recommends appropriate mitigations, and suggests user education initiatives for affected individuals or groups.
Limited travel will be required in the Chicagoland area as needed to perform onsite inspections.
Requirements
Bachelor’s degree in information technology or Cybersecurity required.
1+ years of Information Security Analyst experience.
Information Security certifications are preferred.
Basic understanding of incident response frameworks and threat intelligence concepts.
Familiarity with SIEM tools, EDR solutions, and log analysis.
Knowledge of firewalls, intrusion detection and prevention products.
Knowledge of disaster recovery and business continuity components.
Familiarity with data security frameworks, privacy laws, and regulations (FFIEC, FDIC, GLBA/SOX).
Microsoft Office knowledge; Advanced Excel training, KQL, PowerShell, and other scripting skills highly desired.
Strong communication, technical, analytical, and administrative skills.
Self-motivated, ability to multitask and demonstrate flexibility.
Effective time management skills with a strong attention to detail.
Director of Security Operations overseeing incident response tasks at Gartner. Leading a geographically dispersed team and improving capabilities for detecting and responding to threats.
Senior Manager for Product Security Ops & Strategy at Salesforce overseeing strategic initiatives and ensuring alignment with security goals. Driving operational excellence and executive communication across teams.
Security Operations Manager responsible for planning and managing security programs at Cox Enterprises. Collaborating with stakeholders and analyzing security vulnerabilities while conducting investigations.
Security Operations Centre Analyst for Paysafe, responding to real - time security alerts and assisting Incident Response in security events. Requires collaboration in a global team environment with various security frameworks.
SOC Analyst focusing on real - time security monitoring and incident response for Atos Group in Bengaluru, ensuring proactive threat detection and effective response to incidents.
Manage global corporate security operations programs at OpenAI, collaborating across teams to enhance security measures. Focus on operational standards and program development for effective security initiatives.
Senior SOC Analyst leading advanced security monitoring and response across various platforms. Collaborating with teams to strengthen security posture and mentor junior analysts.
SOC Analyst developing cybersecurity solutions at Capgemini for leading organizations. Engaging in incident response and security operations in a collaborative environment with global colleagues.