Logo
Regions Bank

Cyber Defense Strategy Analyst

Regions Bank, Birmingham, Alabama, United States, 35275

Save Job

Job Description At Regions, the Cyber Security Analyst is responsible for analyzing, identifying, and documenting cybersecurity risks. This role will require a proactive individual with an understanding of core technology and cybersecurity principles along with industry best practices to investigate, remediate, and/or elevate issues for further evaluation.

Primary Responsibilities

Analyze and respond to cyber threats within various security tools according to documented procedures and be capable of identifying when deviations are necessary.

Proactively identify opportunities for tuning security tools, submit requests to support teams, and work with related teams to see tuning through to completion.

Provide recommendations for updates to policies, standards, and procedures to improve process flows.

Perform threat hunting and participate as a key stakeholder in tabletop exercises on a rotational job-duty basis as needed.

Assist in incident response.

Maintain meticulous records of all work performed, including root cause analysis, indicators of compromise, remediation steps, timeline of events, and impact assessment using clear and concise annotations.

Mentor, review, and assist other analysts in documentation and training.

Maintain awareness of active global cybersecurity threat trends and proactively provide guidance where gaps may exist.

Support and collaborate with various cybersecurity teams to document security posture and assess environment for relevant IOCs and gaps.

Participate in and lead various security assessments (e.g., Security Architecture Reviews, Red Team assessments, Purple Team engagements, and formal tabletop exercises).

Participate in and lead planning and support for cyber security engineering and architecture for new projects.

Provide in-depth guidance on process improvement.

Act as a coach and mentor to junior analysts.

Lead special projects.

Serve as a subject matter expert (SME) within cybersecurity.

Requirements

High School Diploma or GED and (10) years of related post‑secondary education and/or experience in Information Security or Information Technology.

Minimum of two (2) relevant certifications in Information Security or the ability to obtain relevant certification within twelve months of start date (e.g., CompTIA Network+/Security+/CySA+, EC‑Council Certified Ethical Hacker (CEH), Cisco CCNA/CCNA‑Security, GIAC GSEC).

Familiarity with regulatory requirements and industry standards such as the Gramm‑Leach‑Bliley Act (GLBA), Payment Card Industry Data Security Standard (PCI‑DSS), NIST, etc.

Willingness and availability to work on a pre‑determined shift and rotational on call.

Preferences

Minimum of one (1) intermediate to advanced Amazon Web Services (AWS) or Azure Architect/Administrator and/or Security specialty certification.

Advanced Incident Response, Cyber Leadership, Penetration Testing certification (e.g., GCIH, GSOM, GPEN, CISSP, CISM, OSCP).

Prior working experience in a Security Operations Center (SOC) environment.

Prior experience developing use cases for a SOC from threat hunting and threat detection engineering to investigation playbook and response procedure development.

Understanding of MITRE ATT&CK Framework and Cyberattack Kill Chain and how these frameworks can be used to identify gaps.

Skills And Competencies

Self‑starter with initiative and drive for continuous improvement.

Team‑oriented, works well with others, and places a premium on group success.

Advanced understanding of information security principles, controls, and technologies.

Strong organizational, research, analytical, and problem‑solving skills to evaluate situations and respond appropriately.

Excellent writing and verbal communication skills.

Strong familiarity with concepts related to security disciplines such as malware analysis, computer forensics, incident response, network intrusion detection, traffic analysis, penetration testing, vulnerability scanning, compliance, audit, or threat intelligence.

Strong investigative and problem‑solving skills.

Additional Job Description

Strong understanding of cyber threat landscape, including TTPs of threat actors.

Experience working with threat intelligence platforms and using tactical or strategic intel to determine relevant threats and plans of action.

Familiarity with MITRE ATT&CK/D3FEND/ATLAS frameworks and threat modeling methodologies.

Proficiency in analyzing indicators of compromise (IOCs), malware, phishing, and network traffic.

Ability to write technical and executive reports and provide verbal briefing or presentations.

Experience with SIEM tools (e.g., Splunk, Elastic) and log analysis.

Familiarity with AI technologies, threats, and risk mitigation.

Position Type Full time

Compensation Details Pay ranges are job specific and are provided as a point‑of‑market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. Minimum: $121,316.25 USD Median: $159,690.00 USD

Benefits Information

Paid Vacation/Sick Time

401K with Company Match

Medical, Dental and Vision Benefits

Disability Benefits

Health Savings Account

Flexible Spending Account

Life Insurance

Parental Leave

Employee Assistance Program

Associate Volunteer Program

Location Details Riverchase Operations Center Hoover, Alabama

Equal Opportunity Employer/including Disabled/Veterans

#J-18808-Ljbffr