Perform day-to-day security information event monitoring (SIEM), correlation and investigation of security events
Monitor all systems and company devices for potential threats and remediating any security vulnerabilities
Provide awareness and enforcement of UMB’s information security policies to UMB associates
Work with our corporate information security risk organization to draft playbooks for cybersecurity incidents
Support the cyber resiliency initiative
Requirements
Bachelor’s Degree in Information Technology and at least 1 year of experience in Information Security or IT, OR at least 3 years of Information Security experience specifically in detection, monitoring, analysis, and resolution of security incidents including firm understanding of various attacks (i.e. email phishing, SQLi, XSS, buffer overflow, data leakage)
Experience in information security incident response, threat intelligence, threat hunting and security incident investigations
Infrastructure experience specific to networking, UNIX or Microsoft Windows operating systems
Patch and vulnerability management experience
Experience with Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS), SIEMs or other information security tools
Bonus Points If: You have AWS cloud infrastructure experience
You have experience operating and administering IBM’s QRadar SIEM
You have working experience operating Proofpoint TAP (Targeted Attack Protection)
You have Information Security experience within the banking/financial services industry
Applicants must have legal authority to work in the United States
Benefits
Paid Time Off
401(k) matching program
Annual incentive pay
Paid holidays
Comprehensive company sponsored benefit plan including medical, dental, vision, and other insurance coverage
Health savings, flexible spending, and dependent care accounts
Lead Security Monitoring and Response Analyst at Mastercard coordinating enterprise crisis response and ensuring organizational resilience. Managing multi - region incident response and critical operations continuity.
IT - Security & Resilience Chief Engineer focusing on Security Monitoring for LBBW. Leading IT - Security projects and ensuring compliance and operational security within IT.
Director leading security operations and enhancing vulnerability management at IDEXX. Driving strategic execution and operational excellence across key domains in cybersecurity.
IT Security Operations Specialist ensuring security of global networks, systems, and data. Implementing security controls and performing advanced threat hunting using Microsoft Sentinel and Darktrace.
Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
GSOC Analyst focusing on critical events and risk management operations at Netflix. Monitoring global threats and coordinating incident management efforts in a hybrid work setting.
GSOC Analyst monitoring global events and managing critical incidents for Netflix's security operations. Ensuring timely communication and assessment during major security threats.
Security Operations Center Engineer enhancing security posture via automation and threat hunting. Requires strong experience with SIEM and SOAR platforms and Python scripting.
Security Operations Vulnerability Analyst II identifying and mitigating security vulnerabilities. Collaborating with teams to ensure timely risk remediation and protection of enterprise systems.
Cyber Defender (SOC Analyst) acts as the key point of contact for major security incidents. Coordinating response efforts and enhancing procedures at a leading AI - powered security partner.