Senior Cyber Analyst at OM Bank leading threat detection, investigation, and incident response in a digital banking environment. Collaborating with internal and external teams to safeguard the bank's digital ecosystem.
Responsibilities
Lead advanced second level line threat monitoring activities in collaboration with the MDR partner across SIEM, EDR, AWS, and broader security technologies.
Perform deep-dive analysis and validation of security alerts, differentiating true positives from noise.
Integrate emerging threat intelligence into detection logic, playbooks, and monitoring strategy.
Lead first and second-level incident response efforts, including containment, eradication, recovery, and root-cause analysis.
Oversee forensic evidence collection, timeline reconstruction, and documentation for major security incidents.
Develop, maintain, and continuously refine incident response playbooks to improve speed and consistency.
Serve as the primary liaison with the MDR partner for threat detection and incident-handling activities.
Provide concise, high-quality updates and reports to the Cyber Defence Lead, senior stakeholders, and risk teams.
Produce post-incident reports, metrics, and analysis to support audits, regulatory reviews, and ongoing improvements.
Lead and participate in proactive threat-hunting exercises across cloud, network, IAM, and application layers.
Recommend and implement improvements to security tooling, alerting, and processes based on incident trends and data.
Support compliance with regulatory, audit, and cybersecurity standards through strong governance and documentation practices.
Requirements
Bachelor’s degree in Cybersecurity, Information Technology, or a related field.
5+ years in cybersecurity with strong emphasis on threat detection, incident response, and security operations.
Experience working with or managing MDR/SOC providers.
Exposure to digital banking, fintech, or regulated financial services environments is highly desirable.
Strong understanding of AWS and Azure cloud security principles, identity security, and modern digital banking architectures.
Proficiency with SIEM (e.g., Sentinel, Splunk), EDR/XDR platforms, and threat intelligence tools.
Hands-on understanding of MITRE ATT&CK, NIST CSF, ISO 27001, or equivalent frameworks.
Familiarity with cloud-native security tooling such as AWS Security Hub, GuardDuty, IAM Access Analyzer, Azure Defender, and Sentinel.
Ability to perform log analysis, packet inspection, and basic forensic investigation.
Benefits
Professional certifications such as CEH, GCIA, GCIH, GCFA, GNFA, Azure/AWS Security Specialty, or equivalent are highly advantageous.
Intelligence Analyst at ERCOT analyzing security threats and operational risks to business continuity. Preparing threat assessments and monitoring geopolitical developments impacting security landscape.
Strategic intelligence analyst at Unimed Nacional optimizing global spend through cost forecasts and market analyses. Responsible for dashboards, risk management, and contract oversight.
Strategic analyst consolidating data to improve purchasing decisions and financial risks. Supporting cost predictions and supplier efficiency at Unimed Nacional.
Analista de Inteligência de Pessoas Sr at Comgás focused on enhancing HR strategies via People Analytics and data insights. Collaborating to develop strategic indicators and improve HR efficiency.
Crime Intelligence Analyst at Florida Department of Law Enforcement assisting in criminal investigations and intelligence notifications. Responsible for analytical tasks and handling urgent security notifications.
Price and Market Intelligence Analyst at Signify analyzing market data and trends for strategic decision - making. Collaborating with teams to enhance market understanding and provide actionable insights.
Analista de Inteligência de Mercado Sênior at Scanntech providing insights and market analysis for perfume industry. Engaging with major national and international clients to solve problems through data.
Social Listening & Intelligence Analyst at HUNTER handling data collection and reporting for strategic insights. Focus on social listening and intelligence analysis supporting client and agency needs.
Crime Intelligence Analyst providing tactical analytical assistance for criminal investigations at FDLE. Compiling and analyzing intelligence data from various agencies for law enforcement.
Lead Competitive Intelligence Analyst enhancing USAA's competitive insight capabilities in the Marketing organization. Conduct benchmarking and analyze competitor strategies to inform decision - making.