Information Security Operations Analyst monitoring UMB systems and devices for potential threats. Investigating incidents and collaborating with technical teams in a hybrid role.
Responsibilities
Perform day-to-day security information event monitoring (SIEM), correlation and investigation of security events
Monitor all systems and company devices for potential threats and remediating any security vulnerabilities
Provide awareness and enforcement of UMB’s information security policies to UMB associates
Work with our corporate information security risk organization to draft playbooks for cybersecurity incidents
Support the cyber resiliency initiative
Requirements
Bachelor’s Degree in Information Technology and at least 1 year of experience in Information Security or IT, OR at least 3 years of Information Security experience specifically in detection, monitoring, analysis, and resolution of security incidents including firm understanding of various attacks (i.e. email phishing, SQLi, XSS, buffer overflow, data leakage)
Experience in information security incident response, threat intelligence, threat hunting and security incident investigations
Infrastructure experience specific to networking, UNIX or Microsoft Windows operating systems
Patch and vulnerability management experience
Experience with Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS), SIEMs or other information security tools
Bonus Points If: You have AWS cloud infrastructure experience
You have experience operating and administering IBM’s QRadar SIEM
You have working experience operating Proofpoint TAP (Targeted Attack Protection)
You have Information Security experience within the banking/financial services industry
Applicants must have legal authority to work in the United States
Benefits
Paid Time Off
401(k) matching program
Annual incentive pay
Paid holidays
Comprehensive company sponsored benefit plan including medical, dental, vision, and other insurance coverage
Health savings, flexible spending, and dependent care accounts
Director leading security operations strategy and overseeing investigations at Ford Motor Company. Responsible for global investigations, crisis management, and team leadership.
Lead global Cyber Detect and Respond team at Assa Abloy, ensuring timely incident response and security compliance. Oversee operations while collaborating across IT and business functions for effective threat management.
Lead Cybersecurity Analyst responsible for technical leadership of a 24x7 SOC team at AT&T. Drive operational standards, incident response, and continuous improvement initiatives.
Senior Security Operations Center Analyst protecting computer systems and data through investigation and incident response. Collaborating with IT leaders and mentoring junior analysts in security operations.
Security Operations Engineer creating automations and detection strategies for security infrastructure. Collaborating across teams to enhance security measures and protect organizational assets.
Solution Sales Manager driving revenue growth in Austria and Switzerland's financial sector. Collaborating with teams and managing sales cycles for ServiceNow and Tanium - related services.
Lead SOC Analyst responsible for monitoring and controlling OCLC services. Providing leadership and mentorship while ensuring service delivery and incident management in a hybrid work environment.
Technical Writer supporting Cyber Security Operations Center, documenting processes and workflows for incident response. Collaborating with analysts and engineering teams to create actionable documentation.