USAA
about 21 hours ago
Why USAA?
Let’s do something that really matters.At USAA, we have an important mission: facilitating the financial security of millions of U.S. military members and their families. Not all of our employees served in our nation’s military, but we all share in the mission to give back to those who did. We’re working as one to build a great experience and make a real impact for our members.
We believe in our core values of honesty, integrity, loyalty and service. They’re what guides everything we do – from how we treat our members to how we treat each other. Come be a part of what makes us so special!
The Opportunity
The Cyber Threat Operations Center (CTOC) is USAA’s equivalent to a traditional Security Operations Center. The CTOC safeguards against cybersecurity threats targeting USAA and includes teams supporting cyber threat intelligence, detection, analysis, and response. USAA is seeking a information security professional to join the CTOC InsiderThreat Response (ITR) team supporting our Data Loss Prevention (DLP) program and efforts to protect USAA assets from threats originating inside the environment. The role involves managing the DLP platform and its policies as well as collaborating with data management partners and business customers. ITR analysts are also called upon to support incident response efforts and leverage a variety of cyber defense tools to detect, analyze, and respond to threats.
We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in one of the following locations: San Antonio, TX, Plano, TX, Phoenix, AZ, or Colorado Springs, CO.
Relocation assistance is not available for this position.
What youll do:
Maintains awareness of the latest critical information security vulnerabilities, threats, and exploits.
Assists in conducting routine vulnerability management, security configuration assessments, and/or penetration testing operations.
Monitors internal and external networks, systems, and applications for security anomalies and events (e.g. suspicious behavior, attacks, and security breaches).
Assists in responding to cyber incidents, performing moderately complex analysis using security tools. Builds a broad range of knowledge, understanding, and experience (e.g. forensics, networking, servers, coding, etc.) to determine a malicious actors tactics, techniques, and procedures.
Under direct supervision, uses the discoveries from the incident response process to make basic improvements to the existing detection capabilities and security controls.
Documents findings of completed alerts and assists with incident documentation.
Serves as a resource to team members on escalated issues of a routine nature.
Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.
What you have:
Bachelor’s degree; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.
2 years of related experience in Information Security, Cybersecurity and/or Information Technology with a security focus to include accountability for moderately sophisticated tasks and/or projects.
1 year of related experience in one of the following domains: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communications and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security.
Developing level of business insight in the areas of business operations, risk management, industry practices and emerging trends.
What sets you apart:
Understanding of data loss prevention, cloud access security broker, sensitive database monitoring, and SIEM tools
Experience using the Symantec Data Loss Prevention platform
Understanding of the MITRE ATT&CK framework
Understanding of the cyber threat landscape associated with insider threat detection, response, and mitigation
Experience with enterprise logging technologies such as ELK or Splunk
Experience with scripting languages such as Python or PowerShell
Cybersecurity operations and incident response experience
Experience communicating technical issues to non-technical audiences
CISSP, SANS, or other Information Security certifications
The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.
What we offer:
Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location. The salary range for this position is: $74,210 - $141,830
Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.
Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.
For more details on our outstanding benefits, please visit our benefits page on USAAjobs.com.
Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.
USAA is an equal opportunity and affirmative action employer and gives consideration for employment to qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity or expression, pregnancy, national origin, age, disability, genetic information, protected veteran status, or any other legally protected characteristic.