Logo
Busey

Senior IT Security Analyst

Busey, Cape Coral, Florida, United States, 33990

Save Job

Overview

Senior IT Security Analyst role at Busey. The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events, monitoring application, host, and network threats, and coordinating with internal teams and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies. This role requires ongoing research, threat documentation, risk assessment, and information sharing with those who need to know. The analyst should continually adapt to stay ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate systems. This is a hands-on, security-focused role that requires passion and rigor to protect the business.

Duties & Responsibilities

Develop, manage, and maintain threat intelligence and threat hunting programs and processes Research emerging threats and tactics, techniques, and procedures (TTPs) in public and closed forums; work with colleagues to assess risk and implement or validate controls Assist with Security Operations activities, including triage of alarms/alerts and performing technical security assessments Participate in a call tree for outsourced Security Operations Center to triage and remediate critical/high alerts, including after business hours Research and recommend solutions to meet regulatory standards (FFIEC, Sarbanes-Oxley, GLBA) and other applicable financial services regulations Periodically review IT procedures and security of all systems to maintain data integrity Document and verify IT-related changes in accordance with security policies and procedures Recommend hardware and software solutions to augment existing security measures Stay current with IT security events and trends Investigate and report security violations and incidents; ensure proper protections and corrective measures are taken Conduct scheduled reviews of key application security settings Develop metrics and scorecards to measure risk and the effectiveness of SOC activities Assist in process development and improvements to maximize department efficiency Support audit and incident processes as required Monitor and support internal SIEM systems, reports, and searches Monitor and support internal phishing email reporting systems Collaborate with cross-functional teams and develop strong liaison relationships with business and technology units Coach Level I & II staff on security domains and program processes Participate in security work streams for enterprise projects Communicate security risk postures to partners and leaders as appropriate Education & Experience

Knowledge of threat information sharing and threat hunting in medium to large environments Proficient with SIEM tools, threat intelligence platforms, SOAR solutions to manage incidents and remediation Understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure Proficiency with Windows, Linux, and macOS for threat research and incident response Experience in incident handling and investigation using formal chain-of-custody methods and forensic tools Knowledge of adversary TTPs, MITRE ATT&CK, and CVSS Scripting ability in Python, Bash, Perl, RegEx, or PowerShell Familiarity with cloud architectures, security standards, and best practices Strong oral and written communication skills Strong organizational skills and attention to detail Excellent interpersonal skills Ability To

Analyze incident logs, attack vectors, vulnerabilities, and exploits Take independent action within established options; develop new procedures as needed Analyze assignments using broad knowledge across factors requiring advanced concepts Self-starter requiring minimal supervision Highly organized and efficient Demonstrated strategic and tactical thinking Stay current with the evolving threat landscape Perform duties and make decisions under time pressures Education And Training

Preferred: Bachelor’s degree in Computer Science, MIS, or related field, or equivalent work experience On-the-job training in security operations, threat intel and hunting, system administration, incident response, or equivalent Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness to pursue certification within six months of hire At least 5 years’ experience in SOC, threat intelligence/hunting, or security systems administration Knowledge of Microsoft Office and other productivity tools Benefits and Compensation

Salary is based on factors including duties, qualifications, experience, and local market trends. Base pay range: $86,000 - $123,000/year. The role may be eligible for bonus or incentives based on company and individual performance. Busey offers a Total Rewards package including 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical/dental/vision, life insurance, disability, wellness incentives, employee assistance, and pretax benefits where eligible. Equal Opportunity: Busey is an Equal Opportunity Employer including Disability/Vets. For more, see Busey’s Equal Opportunity Employment policy at Busey.com/Careers. Important Notices

Unsolicited Resumes: Busey Bank does not pay recruitment fees unless a binding written agreement is in place. Agencies are asked not to contact associates. No phone calls or emails about recruiters.

Application Deadline: 11/15/25

#J-18808-Ljbffr