TIAA Jobs

Job Information

TIAA Cybersecurity Analyst, Insider Threat in CHARLOTTE, North Carolina

COMPANY OVERVIEW:

TIAA is a unique financial partner. With an award-winning track record for consistent performance, TIAA is the leading provider of financial services in the academic, research, medical, cultural and government fields. TIAA has $1 trillion in assets under management (as of 9/30/2018) and offers a wide range of financial solutions, including investing, banking, advice and guidance, and retirement services.

POSITION SUMMARY:

The Senior Insider Threat Cyber Analyst within the Cyber Investigations organization will report into the Manager of the Insider Threat Unit. This person will support the establishment and execution of the insider threat program. Will conduct data analysis utilizing forensic and data mining tools to identify insider threat activity. Collect, search, recover, and organize electronic information in all phases of an investigations related to litigation, employee investigations, incident response and cyber security events. They will conduct user activity and network monitoring based on the results of data analysis, or specific inquiries from stakeholders including Human Resources, Internal Audit and other investigative partners. The Analyst must be able to identify potential data leaks and determine if information constitutes a violation any company policies related to Personal Identifiable Information (PII) or Intellectual Property (IP). Evaluate user activity to determine if the activity is within the user’s day to day responsibility or potentially an abuse of privilege or unauthorized.

KEY RESPONSIBILITIES AND DUTIES:

  • Further the design and maturation of TIAA’s InsiderThreat program

  • Develop and deliver stakeholder presentations whichfurther the awareness and understanding of the insider threat program andcapabilities

  • Conduct and triage anomalous events of concern usingindustry data loss prevention tools to include User and Entity BehaviorAnalytics (UEBA) and User Activity Monitoring (UAM) capabilities.

  • Propose and execute program initiatives, andcollaborate with key stakeholders to create business value

  • Receive, evaluate and initiate the processing of cyberforensic investigations

  • User activity monitoring

  • Develop strategies to improve the efficiency andconsistency of service delivery

  • Provision of report and statements in clear unambiguouslanguage

  • Maintain a strong focus on case logs, repeatability andchain of custody

  • Identification of root cause in partnership with peergroups on remediation of control gaps/failures

  • Interact with and lead discussions with executivesacross different functions and lines of business

  • Maintain an awareness of industry challenges andadvancements in order to add value to existing technologies and processesused within the team

  • Search and seizure of physical and logical evidence

  • Imaging of hard disk drives and other digital storagemedia

  • Digital forensic examination and analysis

  • Recovery of deleted files and folders, internethistory, deleted emails, identification of attached devices, analysis ofevent logs and proxy logs

  • Network packet capture and analysis

  • Mentor junior analysts

  • Potential travel (occasional) related to investigativeneeds.

QUALIFICATIONS:

Required Skills:

  • Minimum 7 years’ of IT experience

  • Minimum 4 years of experience in Cybersecurity

  • Minimum 2 years of experience working with at least one of the following enterprise SIEM tools (Splunk, ArcSight,LogRhythm, FireEye, CrowdStrike) or UBA (User Behavior Analytics).

Desired Skills (Preferred, notrequired):

  • Possess one or more of the following certifications:CFCE, CCE, EnCE, ACE, GCFA, CISSP, CFE or similar IT securitycertifications

  • Bachelor’s degree

  • Insider Threat program experience as a focus areawithin Cybersecurity

  • Strong knowledge of User Behavior Analytical conceptsand products

  • Mix of intelligence, threat analysis, investigativeexperience, and technical skills related to cyber security and insiderthreats

  • 3-5+ years in computer forensic investigations

  • Working knowledge of Data Loss Prevention controls(e.g. Symantec, McAfee, Websense)

  • Proven ability to self-direct project outcomes, withminimal supervision, to achieve program goals.

  • Working knowledge of conducting a forensicsinvestigation

  • Hands on experience with an Incident Management Tool(RSA Archer, ServiceNow)

  • Hands on experience with user activity monitoring toolssuch as ObserveIT, Veriato 360 or similar product

  • Experience with databases, SQL, and data visualizationtools

  • Experience with Windows, MacOS, Linux, iOS

  • Working knowledge of reviewing Windows, MacOS, or *NIXlogs

  • Ability to build consensus and cooperation as well asthe ability to interact, influence, and negotiate with leadership withinthe firm.

  • Ability to navigate and work effectively across acomplex organization.

  • Experience in financial services including Retirements,Retail/Commercial banking, or another other financial institution line ofbusiness (Brokerage, Insurance, or Asset Management)

  • Good understanding of data privacy laws and experienceinteracting with Legal and Compliance professionals

EqualEmployment Opportunity is not just the law, it’s our commitment. Read moreabout the.

If youneed assistance applying due to visually or hearing impaired, please email.

We arean Equal Opportunity/Affirmative Action Employer. We will consider allqualified applicants for employment regardless of age, race, color, nationalorigin, sex, religion, veteran status, disability, sexual orientation, genderidentity, or any other legally protected status.

Additional Information

  • Requisition ID: 1718002

Field: Technology

Company: TIAA

Post Date: Mar 26, 2019

DirectEmployers