Job Summary:
Monitors security systems and events to assess, detect, analyze, and investigate threats. Works regularly with relevant teams to enhance current solutions to improve security posture. Communicates technical security requirements, installs security measures, and recommends raising the level of security awareness. Ensures policy compliance within the Company.
Job Duties:
Monitors and analyzes potential infrastructure security events to determine if the event qualifies as a legitimate security incident. Conducts network monitoring and intrusion detection analysis using various Computer Network Defense tools, such as Intrusion Detection/Prevention Systems, Firewalls, SIEM, NAC, and Vulnerability Management tools. Performs preliminary security incident investigations, following forensic guidelines to preserve evidence for potential legal action. Conducts correlation analysis across numerous internal and external data sources, identifying security incidents and supporting incident response activities. Assists in conducting security testing, verification, and risk analysis of the Company’s network and systems. Properly escalates security incidents to the Director, Information Security and/or Chief Information Officer. Analyzes and reports patching status of OS and Applications and works directly with applicable teams for remediation. Delivers Security Awareness Training content to the Company. Appropriately informs and advises senior analysts/management on incidents and incident prevention. Participates in knowledge sharing with other analysts to develop solutions efficiently. Performs other job-related duties as assigned.
SUPERVISORY RESPONSIBILITIES
No supervisory responsibility.
Qualifications:
EDUCATIONAL REQUIREMENT
Bachelor’s degree from a 4-year college or university in Computer Science, Information Systems, or a related field; or a combination of education and at least two (2) years of experience in cybersecurity.
EXPERIENCE REQUIREMENT
At least two (2) years of experience in cybersecurity or a related field.
COMPUTER SKILLS
An individual should have knowledge of Contact Management systems; Database Design; Development software; Internet software; Project Management software; Spreadsheet software; and Word Processing software.
CERTIFICATES, LICENSES, REGISTRATIONS
Must possess a valid driver's license with a driving history verified through a motor vehicle report that meets requirements for Cherokee Nation underwriting rating. Occasional travel between training locations will be required.
OTHER QUALIFICATIONS
The employee must not be and will not be under sanction by the United States Department of Health and Human Services Office of the Inspector General (OIG) or by the General Services Administration (GSA) or listed on the OIG's Cumulative Sanction Report, or the GSA's List of Excluded Providers, or listed on the OIG's List of Excluded Individuals/Entities (LEIE). Must possess technical and analytical skills in modern data security strategy. Knowledge of firewalls, proxies, SIEM, antivirus, and IDPS concepts. Demonstrate attention to detail, possess interpersonal, critical thinking, and time management skills. Ability to identify problems and review related information to develop, evaluate and implement appropriate solutions. Must be able to obtain and maintain licensing by the appropriate gaming authority.
WORK ENVIRONMENT
This position is primarily performed in a climate-controlled office setting. Some travel and overnight stay may be required.