Job Summary
We believe great work happens when flexibility and connection come together, and when we respect the whole person, not just the professional. That is why we operate under one flexible work model with a hybrid schedule of three in-office days per week, aligned to one of our three Greater Philadelphia area offices. Your Talent Acquisition partner will work closely with you to confirm the office location that best aligns with the role and your home location, ensuring you have the right balance of connection, collaboration, and flexibility to thrive.
The Analyst, Corporate Cybersecurity I will be an important entry-level member of the cybersecurity team responsible for the execution, development and maintenance of the corporate cybersecurity program. This junior level position will be responsible for following operational procedures and direction to review monitoring systems and address security policy issues. This position will follow procedures to enforce security policies that protect the enterprise's systems and data from access by unauthorized users utilizing the latest cybersecurity technology tools, procedures, and practices.
Responsibilities
- Leverage internally developed and third-party security solutions to monitor the security and availability of enterprise computing environments. Review logs and analyze output from the Security Information and Event Management (SIEM) system and other cybersecurity-owned platforms. Perform daily preventive and remediation maintenance activities. Participate in internal and external audits related to corporate IT systems, security plans, and policies. 40%
- Utilize internally developed and third-party security solutions to identify security gaps and threats within the environment. Enhance security visibility by identifying additional data elements to collect from systems and developing processes to leverage that data effectively. Analyze findings from multiple data sources — including trend analysis, automated scanning, and manual testing — to identify security flaws and misconfigurations. 30%
- Participate in security initiatives — ranging from large-scale projects to targeted tasks — aimed at improving the overall security posture of the organization's computing environment. Collaborate with other IT functional groups and core business units to implement, maintain, and enforce the corporate information security program. 10%
- Serve as a key contributor to incident response planning, testing, investigation, and remediation efforts. Analyze security incidents in a timely manner to determine whether formal response execution and escalation are required, and coordinate with the broader Cybersecurity team throughout the response lifecycle. 10%
- Develop and maintain documentation for operational security policies, processes, and procedures. Create and update standards for data access, protection, and backup to ensure consistent and compliant security practices across the organization. 10%
KSAs (Knowledge, Skills, and Abilities)
- Familiarity with various information technology topics including core Internet and network technologies, i.e., TCP/IP, DNS, DHCP, HTTP/S, SMTP/S, etc. Experience with configuring, administering, and troubleshooting operating systems, including UNIX, Linux, Windows, and iOS. Hands on experience with enterprise Microsoft technologies such as Active Directory, Group Policy, MSSQL, IIS, and Exchange are preferred.
- Good understanding of cybersecurity tools and the sources available to conduct cyber security alerting, analysis, and enhanced situational awareness. Experience with network vulnerability assessments and penetration testing, and cybersecurity evaluation and testing tools. Experience with cyber incident forensics a plus.
- Knowledge of a variety of security protocols and topics to include: SSL/TLS, SSH, hashing and encryption algorithms, PKI, multi-factor authtentication technologies, penetration test tactics and methodologies, scripting and automation with PowerShell, Python and other tools.
- Ability to follow documented procedures, create and update documentation, strong oral and written communication skills to work through tasks with other information technology professionals and customers within our businesses.
- Knowledge of operational security topics including access controls, change management, data privacy & classification, logging & monitoring, security awareness, and security awareness. Project and task management capabilities, organizational skills, and change management abilities.
Minimum Qualifications
- Bachelor’s Degree in Arts/Sciences (BA/BS) in a related field Preferred
- 0-2 or more years experience in information technology, Internship or Co-Op in an information security or related position Required
In compliance with this state's pay transparency laws, the salary range for this role is $75,280 - $122,330. This is not a guarantee of compensation or salary, as final offer amount may vary based on factors including but not limited to experience and geographic location. (The specific programs and options available to an employee may vary depending on date of hire, schedule type, and the applicability of collective bargaining agreements).
Essential Functions
- Visual acuity (e.g., needed to prepare and analyze data, to transcribe documents, to view a computer, to read, to inspect objects, to operate machinery
- Manual Dexterity (e.g., picking, pinching, typing, or other working that uses the fingers)
- Grasping (e.g., use of hand to apply pressure)
- Capacity to think, concentrate and focus over long periods of time
- Ability to write complex documents in the [English] language
- Ability to read complex documents in [English] language
- Capacity to express thoughts orally (e.g., accurately, quick and loudly convey spoken instructions to workers)
- Ability to regularly perform all job functions at Company’s office or work site O/C (Often/ Critical)
Travel:
As required
Compensation and Benefits
Compensation and Benefits-