Busey
Position Summary
The Senior IT Security Analyst is responsible for managing activities related to monitoring and responding to security events. The analyst monitors application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies. The analyst conducts in-depth research, documents threats, understands the risk to the business, and shares information with those who need to know. Analysts are expected to adapt continuously to stay ahead of cyber attackers and remain up to date on the latest methods attackers use to infiltrate computer systems. Continuous learning and growth are expected. This role requires a passion for security and rigor to protect the business. Duties & Responsibilities
Develop, manage, and maintain threat intelligence and threat hunting program and processes. Research and identify emerging threats and TTPs in public and closed forums; work with colleagues to assess risk and implement or validate controls. Assist with Security Operations activities, including triage of alarms/alerts and performing technical security assessments. Participate in call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high‑rated alerts during and after business hours. Research and recommend solutions to fulfill regulatory compliance (FFIEC guidelines, Sarbanes‑Oxley, Gramm‑Leach‑Bliley, etc.). Perform periodic review of IT procedures and security of all systems to maintain integrity of company and customer data. Document and verify IT‑related changes in accordance with company security policies and procedures. Research and recommend hardware and software solutions to augment existing security measures. Stay current in events and trends in IT security. Investigate and report any security violations and incidents; ensure proper corrective measures are taken. Conduct scheduled reviews of key application security settings. Develop metrics and scorecards to measure risk to the organization and effectiveness of SOC associates. Assist in process development and improvements to maximize department efficiency. Support audit and incident processes as required. Monitor and support internal SEIM systems, reports, and searches. Monitor and support internal phishing email report systems. Partner with cross‑functional teams and establish relationships with key business and technology teams. Coach Level I & II security professionals on domains and program processes. Participate in security work streams for enterprise projects and initiatives. Determine and communicate security risk postures to partners and leaders. Education & Experience
Strong experience with threat intelligence sharing and hunting processes in medium‑to‑large environments. Proficiency with SIEM tools, threat intelligence platforms, and SOAR solutions to centralize incident response. Knowledge of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. Proficiency in operating systems (Windows, Linux, macOS) for threat research and incident response. Experience in incident handling, forensic tools, and best practices. Knowledge of MITRE ATT&CK framework, CVSS. Programming/scripting skills (Python, Bash, Perl, PowerShell, RegEx). Familiarity with cloud architectures and security standards. Strong oral and written communication skills. Strong organizational skills and attention to detail. Ability To
Analyze incident logs and attack vectors. Take independent action and develop new procedures. Work under minimal supervision and high time pressure. Remain current with evolving threat landscape. Education And Training
(Preferred) Bachelor’s degree in Computer Science, MIS, or related field. On‑the‑job training in security operations, threat intelligence, hunting, system administration, or incident response. Security+, CySA+, GCIH, CSA, CCSP or similar; or willingness to pursue certification within first six months. At least 5 years’ experience in SOC environments, threat intelligence/hunting, or security administration. Benefits And Compensation
Base salary range: $86,000 – $123,000 per year. Potential bonus or incentives based on performance. Busey provides a competitive Total Rewards package, including 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, life insurance, disability coverage, wellness incentives, and an employee assistance program. Equal Opportunity
Busey is an Equal Opportunity Employer, including Disability/Vets. Application Deadline
11/15/25
#J-18808-Ljbffr
The Senior IT Security Analyst is responsible for managing activities related to monitoring and responding to security events. The analyst monitors application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies. The analyst conducts in-depth research, documents threats, understands the risk to the business, and shares information with those who need to know. Analysts are expected to adapt continuously to stay ahead of cyber attackers and remain up to date on the latest methods attackers use to infiltrate computer systems. Continuous learning and growth are expected. This role requires a passion for security and rigor to protect the business. Duties & Responsibilities
Develop, manage, and maintain threat intelligence and threat hunting program and processes. Research and identify emerging threats and TTPs in public and closed forums; work with colleagues to assess risk and implement or validate controls. Assist with Security Operations activities, including triage of alarms/alerts and performing technical security assessments. Participate in call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high‑rated alerts during and after business hours. Research and recommend solutions to fulfill regulatory compliance (FFIEC guidelines, Sarbanes‑Oxley, Gramm‑Leach‑Bliley, etc.). Perform periodic review of IT procedures and security of all systems to maintain integrity of company and customer data. Document and verify IT‑related changes in accordance with company security policies and procedures. Research and recommend hardware and software solutions to augment existing security measures. Stay current in events and trends in IT security. Investigate and report any security violations and incidents; ensure proper corrective measures are taken. Conduct scheduled reviews of key application security settings. Develop metrics and scorecards to measure risk to the organization and effectiveness of SOC associates. Assist in process development and improvements to maximize department efficiency. Support audit and incident processes as required. Monitor and support internal SEIM systems, reports, and searches. Monitor and support internal phishing email report systems. Partner with cross‑functional teams and establish relationships with key business and technology teams. Coach Level I & II security professionals on domains and program processes. Participate in security work streams for enterprise projects and initiatives. Determine and communicate security risk postures to partners and leaders. Education & Experience
Strong experience with threat intelligence sharing and hunting processes in medium‑to‑large environments. Proficiency with SIEM tools, threat intelligence platforms, and SOAR solutions to centralize incident response. Knowledge of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. Proficiency in operating systems (Windows, Linux, macOS) for threat research and incident response. Experience in incident handling, forensic tools, and best practices. Knowledge of MITRE ATT&CK framework, CVSS. Programming/scripting skills (Python, Bash, Perl, PowerShell, RegEx). Familiarity with cloud architectures and security standards. Strong oral and written communication skills. Strong organizational skills and attention to detail. Ability To
Analyze incident logs and attack vectors. Take independent action and develop new procedures. Work under minimal supervision and high time pressure. Remain current with evolving threat landscape. Education And Training
(Preferred) Bachelor’s degree in Computer Science, MIS, or related field. On‑the‑job training in security operations, threat intelligence, hunting, system administration, or incident response. Security+, CySA+, GCIH, CSA, CCSP or similar; or willingness to pursue certification within first six months. At least 5 years’ experience in SOC environments, threat intelligence/hunting, or security administration. Benefits And Compensation
Base salary range: $86,000 – $123,000 per year. Potential bonus or incentives based on performance. Busey provides a competitive Total Rewards package, including 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, life insurance, disability coverage, wellness incentives, and an employee assistance program. Equal Opportunity
Busey is an Equal Opportunity Employer, including Disability/Vets. Application Deadline
11/15/25
#J-18808-Ljbffr