Busey
Position Summary
Position Summary
The Senior IT Security Analyst is responsible for managing activities related to monitoring and responding to security events. The analyst monitors application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team, the analyst works closely with internal technical teams, business units, and external entities such as private intelligence‑sharing groups, law enforcement, and government agencies. The analyst conducts in‑depth research, documents threats, understands business risk, and shares information with stakeholders. Continual learning and adaptation to stay ahead of cyber attackers are essential.
Duties & Responsibilities
Develop, manage, and maintain threat intelligence and threat hunting programs and processes.
Research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to assess risk and implement or validate controls.
Assist with Security Operations activities, including triage of alarms/alerts and performing technical security assessments.
Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high‑rated alerts.
Research and recommend solutions to fulfill regulatory compliance with FFIEC, Sarbanes‑Oxley, Gramm‑Leach‑Bliley, and other applicable regulations.
Perform periodic reviews of IT procedures and security of all systems to maintain data integrity.
Document and verify IT‑related changes in accordance with company security policies and procedures.
Research and recommend hardware and software solutions to augment existing security measures.
Stay current on IT security events and trends.
Investigate and report security violations and incidents, ensuring proper protection and corrective actions.
Conduct scheduled reviews of key application security settings.
Develop metrics and scorecards to measure risk and effectiveness of SOC associates.
Assist in process development and improvements to maximize efficiency and effectiveness of security programs.
Support audit and incident processes as required.
Monitor and support internal SEIM systems, reports, and searches.
Monitor and support internal phishing email report systems.
Partner with cross‑functional teams to align security initiatives.
Coach Level I & IIs on security domains and program processes.
Depending on need, VP Security may designate a Team Lead for Level III.
Participate in security work streams for various enterprise projects and initiatives.
Determine and communicate security risk postures to partners and leaders as appropriate.
Education & Experience
Strong experience with threat information sharing and hunting in medium to large environments.
Proficiency with SIEM tools, threat intelligence platforms, and SOAR solutions.
Knowledge of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
Proficiency in Windows, Linux, and macOS for threat research and incident response.
Experience in incident handling using formal chain‑of‑custody methods and forensic tools.
Knowledge of MITRE ATT&CK framework and CVSS.
Programming skills in Python, Bash, Perl, RegEx, or PowerShell.
Familiarity with cloud architectures, security standards, and best practices.
Strong oral and written communication skills.
Strong organizational skills and attention to detail.
Excellent interpersonal skills.
Ability To
Analyze incident logs, attack vectors, and vulnerabilities.
Take independent action within established options and develop new procedures.
Apply advanced knowledge to solve complex problems.
Self‑starter requiring minimal supervision.
Highly organized and efficient.
Demonstrated strategic and tactical thinking.
Stay current with evolving threat landscape.
Perform duties under frequent time pressures.
Education and Training
(Preferred) Bachelor’s degree in Computer Science, MIS, or related field or equivalent experience.
On‑the‑job training in security operations, threat intel/hunting, system administration, or incident response.
Security+, CySA+, GCIH, CSA, CCSP or similar certification; willingness to pursue certification within first six months.
At least 5 years’ experience in SOC environments, threat intel/hunting, or security systems administration.
Knowledge of Microsoft Office and other productivity tools.
Benefits and Compensation Salary offered ranges from $86,000 to $123,000 per year. Busey provides a competitive Total Rewards package including 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, life and disability insurance, wellness incentives, and an employee assistance program.
Equal Opportunity Busey values a diverse and inclusive workplace and is an Equal Opportunity Employer, including Disability/Vets. Busey is committed to recruiting, developing, and retaining individuals with exceptional talent.
Unsolicited Resumes Busey Bank and its subsidiaries do not accept unsolicited resumes or phone calls for recruiters or agencies without a written agreement. Busey reserves the right to hire candidates without financial obligation to the agency unless an agreement is in place.
Application Deadline 11/15/25
#J-18808-Ljbffr
The Senior IT Security Analyst is responsible for managing activities related to monitoring and responding to security events. The analyst monitors application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team, the analyst works closely with internal technical teams, business units, and external entities such as private intelligence‑sharing groups, law enforcement, and government agencies. The analyst conducts in‑depth research, documents threats, understands business risk, and shares information with stakeholders. Continual learning and adaptation to stay ahead of cyber attackers are essential.
Duties & Responsibilities
Develop, manage, and maintain threat intelligence and threat hunting programs and processes.
Research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to assess risk and implement or validate controls.
Assist with Security Operations activities, including triage of alarms/alerts and performing technical security assessments.
Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high‑rated alerts.
Research and recommend solutions to fulfill regulatory compliance with FFIEC, Sarbanes‑Oxley, Gramm‑Leach‑Bliley, and other applicable regulations.
Perform periodic reviews of IT procedures and security of all systems to maintain data integrity.
Document and verify IT‑related changes in accordance with company security policies and procedures.
Research and recommend hardware and software solutions to augment existing security measures.
Stay current on IT security events and trends.
Investigate and report security violations and incidents, ensuring proper protection and corrective actions.
Conduct scheduled reviews of key application security settings.
Develop metrics and scorecards to measure risk and effectiveness of SOC associates.
Assist in process development and improvements to maximize efficiency and effectiveness of security programs.
Support audit and incident processes as required.
Monitor and support internal SEIM systems, reports, and searches.
Monitor and support internal phishing email report systems.
Partner with cross‑functional teams to align security initiatives.
Coach Level I & IIs on security domains and program processes.
Depending on need, VP Security may designate a Team Lead for Level III.
Participate in security work streams for various enterprise projects and initiatives.
Determine and communicate security risk postures to partners and leaders as appropriate.
Education & Experience
Strong experience with threat information sharing and hunting in medium to large environments.
Proficiency with SIEM tools, threat intelligence platforms, and SOAR solutions.
Knowledge of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
Proficiency in Windows, Linux, and macOS for threat research and incident response.
Experience in incident handling using formal chain‑of‑custody methods and forensic tools.
Knowledge of MITRE ATT&CK framework and CVSS.
Programming skills in Python, Bash, Perl, RegEx, or PowerShell.
Familiarity with cloud architectures, security standards, and best practices.
Strong oral and written communication skills.
Strong organizational skills and attention to detail.
Excellent interpersonal skills.
Ability To
Analyze incident logs, attack vectors, and vulnerabilities.
Take independent action within established options and develop new procedures.
Apply advanced knowledge to solve complex problems.
Self‑starter requiring minimal supervision.
Highly organized and efficient.
Demonstrated strategic and tactical thinking.
Stay current with evolving threat landscape.
Perform duties under frequent time pressures.
Education and Training
(Preferred) Bachelor’s degree in Computer Science, MIS, or related field or equivalent experience.
On‑the‑job training in security operations, threat intel/hunting, system administration, or incident response.
Security+, CySA+, GCIH, CSA, CCSP or similar certification; willingness to pursue certification within first six months.
At least 5 years’ experience in SOC environments, threat intel/hunting, or security systems administration.
Knowledge of Microsoft Office and other productivity tools.
Benefits and Compensation Salary offered ranges from $86,000 to $123,000 per year. Busey provides a competitive Total Rewards package including 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, life and disability insurance, wellness incentives, and an employee assistance program.
Equal Opportunity Busey values a diverse and inclusive workplace and is an Equal Opportunity Employer, including Disability/Vets. Busey is committed to recruiting, developing, and retaining individuals with exceptional talent.
Unsolicited Resumes Busey Bank and its subsidiaries do not accept unsolicited resumes or phone calls for recruiters or agencies without a written agreement. Busey reserves the right to hire candidates without financial obligation to the agency unless an agreement is in place.
Application Deadline 11/15/25
#J-18808-Ljbffr