Information Security Operations Analyst monitoring UMB systems and devices for potential threats. Investigating incidents and collaborating with technical teams in a hybrid role.
Responsibilities
Perform day-to-day security information event monitoring (SIEM), correlation and investigation of security events
Monitor all systems and company devices for potential threats and remediating any security vulnerabilities
Provide awareness and enforcement of UMB’s information security policies to UMB associates
Work with our corporate information security risk organization to draft playbooks for cybersecurity incidents
Support the cyber resiliency initiative
Requirements
Bachelor’s Degree in Information Technology and at least 1 year of experience in Information Security or IT, OR at least 3 years of Information Security experience specifically in detection, monitoring, analysis, and resolution of security incidents including firm understanding of various attacks (i.e. email phishing, SQLi, XSS, buffer overflow, data leakage)
Experience in information security incident response, threat intelligence, threat hunting and security incident investigations
Infrastructure experience specific to networking, UNIX or Microsoft Windows operating systems
Patch and vulnerability management experience
Experience with Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS), SIEMs or other information security tools
Bonus Points If: You have AWS cloud infrastructure experience
You have experience operating and administering IBM’s QRadar SIEM
You have working experience operating Proofpoint TAP (Targeted Attack Protection)
You have Information Security experience within the banking/financial services industry
Applicants must have legal authority to work in the United States
Benefits
Paid Time Off
401(k) matching program
Annual incentive pay
Paid holidays
Comprehensive company sponsored benefit plan including medical, dental, vision, and other insurance coverage
Health savings, flexible spending, and dependent care accounts
Senior Incident Response Engineer leading advanced security responses focused on Microsoft E5 security at Acrisure. Collaborating across teams for robust incident management and security policy enforcement.
Senior Director of Product Marketing coordinating go - to - market strategy for endpoint security solutions at Tanium. Leading cross - functional teams to enhance product positioning and market impact.
SecOps Engineer implementing infrastructure security solutions in AWS and GCP at Tala. Focused on vulnerability management and protection in a global financial infrastructure company.
SOC Manager leading cybersecurity operations and strategies for federal clients in a 24/7 environment. Managing SOC activities and mentoring teams while maintaining security integrity.
SOC Analyst role focusing on IT security posture monitoring and threat detection use case development for MAHLE. Collaborate with global teams to enhance security processes and tools.
Security Operations Engineer at Pexip managing and improving security monitoring systems. Leading security incidents and ensuring effective alerting and automated response.
Security Operations Engineer at Gridware enhancing security, detection, and response in cloud - first environments. Collaborating with IT and engineering teams to implement best practices.
Cybersecurity Operations Director leading cybersecurity managed services operations at a global accounting firm. Overseeing teams, driving growth, and serving as an advisor to clients.
Security Operations Analyst responsible for developing security processes and incident response. Collaborating with multiple teams for security best practices in a hybrid work environment.