What are the responsibilities and job description for the Cyber Security Analyst - Third Party Incident Response position at CLS Group?
Cyber Security Analyst – Third-party incident monitoring and response
Job information:
- Functional title - Cyber Security Analyst – Third-party incident monitoring and response
- Department - IT Security Operations
- Corporate level - Assistant Vice President
- Report to - Vice President, Incident Response
- Location – Iselin, New Jersey
- Expected full-time salary range between $135,000 - 150,000 variable compensation 401(k) match benefits.
Note: Disclosure as required by NJ Pay Transparency Law of the expected salary compensation range for this role.
Purpose:
CLS is seeking a highly motivated, self-driven Cyber Security Analyst to join a global security operations team. This role will over see the security integrity of the extended enterprise perimeter as well as supporting the overall incident response efforts.
The ideal candidate will be aware of industry trends and frameworks and how they could is responsible for the monitoring of third-party interfaces with strategic partners to ensure they adhere to the firm’s response standards and data visibility requirements.
Core responsibilities:
- Supply chain monitoring: Monitor and triage alerts originating from third-party environments or interfaces that impact internal data or critical business paths.
- Operational alignment: Ensure that the internal incident response playbooks align and integrate with external security providers and partners.
- Disconnect/reconnect governance: Design and maintain technical framework for emergency isolation of third-party services and their subsequent return to normal operations criteria.
- Compliance and evidence: Support regulatory reporting by gathering forensics evidence and performing control validation for third-party service components during and after incidents
- Integrated testing: Facilitate joint IR testing activities with external providers
- Security operations: Present weekday fusion calls and participate in the on-call and scheduled rota.
Experience:
- Strong experience in incident response within a complex, multi-provider environment.
- Deep understanding of network architecture and segmentation
- Proficiency in security incident response platforms and their integration with external data feeds.
- Ability to translate technical failures in the supply chain to operational risk and business impact assessments.
Qualifications/Certifications
- Bachelor’s Degree in Cybersecurity studies, Computer Science, or related discipline
- Security certification such as SANS GIAC (or equivalent) such as GCIH, GCFE or GCFA.
- High proficiency in log analysis (SIEM), EDR, antivirus and forensics tools
Salary : $135,000 - $150,000