TBK Bank

Dallas, Texas, United States

Information Security Analyst II

Posted over 1 month ago

Job Description

Join TBK Bank!

At TBK Bank, we're a team of passionate, driven, collaborative, solutions minded people who want to make a difference in the lives of our customers and communities. Our mission is to do well and to do good at the same time. We accomplish this by working together, because at the end of the day, TBK stands for helping the people and business in our communities succeed. We thrive on providing exceptional customer service, and we look for friendly professionals dedicated to helping customers achieve their financial goals.

Position Summary:

The Information Security Analyst II position investigates security alerts, manages, and improves the cyber security toolset, detection, prevention, and response capabilities. The analyst will engage in many facets of the information security program while providing guidance and functioning as an experience resource to junior analysts.

Essential Duties and Responsibilities:

  • Protects the confidentiality, integrity and availability of critical data, systems, and services
  • Safeguard information system assets by identifying and solving potential and actual security and risk concerns
  • Protects systems by defining role and attribute-based access privileges, control structures, and resources.
  • Categorizes risks and threats by identifying abnormalities and reporting violations.
  • Implements security improvements by assessing situation; evaluating trends; anticipating requirements
  • Determines security violations and inefficiencies by conducting periodic audits
  • Monitors, investigates, and responds to security alerts
  • Upgrades cyber security program and capabilities by implementing and maintaining security controls
  • Prepares performance and stability reports to communicate system status to users and management
  • Maintains quality of service by following organization standards, guidelines, and procedures
  • Maintains information security documentation and standard operating procedures
  • Maintains technical knowledge by attending educational workshops, achieving certifications, and subscribing to relevant publication.
  • Perform and track vulnerability assessments and facilitate remediation efforts
  • Assist in various security projects
  • Review and perform daily security system health checks and correct deficiencies
  • Provides documentation and evidence to respond to audits
  • Answer security related helpdesk requests and approvals
  • Maintain an up-to-date application inventory
  • Provides on-call support as needed
  • Contributes to team objectives
  • Understanding of common networking ports and protocols

Experience and Education:

  • Bachelors degree in Information Security, Information Systems, Computer Science, or equivalent work experience
  • 4+ years of relevant experience information technology or security experience
  • One or more information security certifications
  • Cloud analytic security tools
  • CIS 2.0 security and NIST 800-53 framework controls
  • SOC I, SOX, GLBA, and FFIEC regulatory compliance

Skills and Abilities Required:

  • Ability to function with moderate supervision
  • Strong interpersonal skills
  • Quality written and oral communication, and presentation skills
  • Critical thinking and problem-solving skills
  • Attention to detail
  • Commitment to operational excellence and continuous process improvement
  • Willingness to expand and apply security knowledge, skills, and abilities to department initiatives
  • System administration
  • Network security concepts
  • Information security policy
  • On-call network troubleshooting
  • Firewall administration
  • Network protocols
  • Intrusion Detection and Prevention systems (IDS/IPS)
  • Data Loss Prevention (DLP)
  • Virtual Private Networks (VPN)
  • Multi-Factor Authentication (MFA)
  • Endpoint Detection and Response (EDR)
  • Mobile Device Management (MDM)
  • Identity Access Management and Privileged Access Management (IAM and PAM)
  • Role and attribute-based access controls
  • (RBAC and ABAC)
  • TLS and certificate management
  • Log analysis
  • URL filtering
  • Patch Management
  • Security Information and Event Monitoring Tools (SIEM)
  • Vulnerability scanners
  • Foundational routing, switching, segmentation
  • E-mail filtering, phishing, SMTP header analysis
  • Wireless technology and security
  • Threat management and response

Work Environment:

The work environment characteristics described here maybe encountered while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Moderate noise (i.e., business office with computers, phone, and printers, light traffic).
  • Ability to work in a confined area.
  • Ability to sit at a computer terminal for an extended period. Occasional stooping or kneeling may be necessary.
  • While performing the duties of this job, the employee is regularly required to stand, sit, talk, hear and use hands and fingers to operate a computer keyboard and telephone.
  • Specific vision abilities are required by this job due to computer work.
  • Light to moderate lifting is required.
  • Occasional travel is required.

#LI-JH1

We offer Medical, Dental, Vision, Paid Time Off, 401k and much more.

Go on. Do it. Apply Today!

877c50a5824a11793e1e46a3586edc41