You might also like
in Denver, CO
IT Security Threat Analyst
Hours | Full-time, Part-time |
---|---|
Location | Denver, CO Denver, Colorado |
About this job
The Security Operations Threat Analyst will be responsible for IT Threat Analysis to include but not limited to: Threat analysis, vulnerability assessments, remediation recommendations, engagement with senior team members and service providers to contribute to overall security posture.
Individual may also be asked to contribute to the following Security Operations functions: maintain security related applications, logging tools, anti-virus, file integrity, and IDS/IPS. Also expected to contribute to the maintenance of documentation and evidence gathering as it relates to regulatory and compliance related activities.
Responsibilities
In addition to following Chipotle’s policies and procedures, individual is expected to be an active, contributing member to IT Security team and functions.
Principal responsibilities include, but are not limited to:
•Being a top performer who achieves high standards and elevates peers to be top performers
•Serving as an internal security subject matter expert while interfacing with applicable departments, groups, and individuals on relevant security initiatives and concerns
•Participating with IT Security team to maintain and ensure that security systems sufficiently and consistently perform and fulfill current security needs
•Maintain a familiarity with use, and tuning of security tools such as: IPS, Logging appliances, SIEM, File Integrity Monitoring, Endpoint Encryption, Endpoint Application Whitelisting, Malware detection and remediation
•Ensuring a smooth implementation of new security applications and changes to the systems through sound testing procedures, planning, and impact analysis
•Participate with IT Security in contributions toward maintaining, and documenting policies and procedures specific to areas of responsibility
•Participate with IT Security toward collaboration with IT Compliance team toward applicable compliance related documentation and analysis as required by internal IT Security, IT Governance, and/or external authorities and regulatory bodies
The ideal candidate will possess:
•3 to 5 years experience performing threat analysis and vulnerability assessment
•3 to 5 years experience in data analysis both through native consoles as well as correlated activity in a SIEM environment
•3 to 5 years experience in tuning recommendations for standard IT Security platforms
•Working knowledge of network and host security components, monitoring, and operations
•Ability to use various security tools to monitor changes and respond to threats, alerts, incident response, event correlation, and escalation
•Ability to investigate and report on anomalies and incidents to their logical and truthful conclusion
•Current testing knowledge and demonstrated ability to perform and analyze results in a complex computing environment
•Excellent written and verbal communication skills
•Ability to multi-task, and serve as a team player in a fast-paced environment and contribute in areas outside of expertise if necessary
•Ability to manage priorities and projects
Education:
•Bachelors Degree or equivelant experience in Information Technology or related field
•Industry and Discipline related certifications, such as CEH, GCIA, GCIH, etc.