1+ months

Lead Cybersecurity Analyst (Hunt / Red Team / Incident Response / Platform Engineer) - 50640

Riverwoods, IL 60015
Apply Now
Apply on the Company Site
  • Job Code
\u003Cp\u003EAt Discover, be part of a culture where diversity, teamwork and collaboration reign. Join a company that is just as employee-focused as it is on its customers and is consistently awarded for both. \u003Cstrong\u003EWe\u0027re all about people, and our employees are why Discover is a great place to work. \u003C/strong\u003EBe the reason we help millions of consumers build a brighter financial future and achieve yours along the way with a rewarding career.\u003C/p\u003E\u003Cp\u003EDiscover is seeking Cybersecurity talent with a minimum of three years of experience in at least 2 of the 5 following disciplines:\u003C/p\u003E\u003Cp\u003E The position can be based in Riverwoods, IL, Chicago, IL, Houston, TX, New ALbany, OH , Phoenix, AZ or Salt Lake City, UT\u003C/p\u003E\u003Cul\u003E\u003Cli\u003ECybersecurity Monitoring\u003C/li\u003E\u003Cli\u003ECybersecurity Threat Intelligence\u003C/li\u003E\u003Cli\u003EAdversary Simulation\u003C/li\u003E\u003Cli\u003ECyber Threat Hunting\u003C/li\u003E\u003Cli\u003ECybersecurity Platform Engineering\u003C/li\u003E\u003Cli\u003ECybersecurity Incident Response\u003C/li\u003E\u003C/ul\u003E\u003Cp\u003E Seasoned candidates are strongly encouraged to apply.\u003C/p\u003E\u003Cp\u003E \u003C/p\u003E\u003Cp\u003E\u003Cstrong\u003ECybersecurity Platform Engineering\u003C/strong\u003E\u003C/p\u003E\u003Cp\u003EThe Platform Engineering Team serves as experts in the creation and operation of solutions for our Security Operations Center (SOC) and related enterprise teams. Spread across two functional areas (technology and analytics), key responsibilities include development of custom tools, creation of new security detection logic, partnering with our Security Operations Center (SOC) to ensure their success, and working with big data platforms to achieve our mission.\u003C/p\u003E\u003Cp\u003EThe ideal candidate has prior experience in an engineering or security-related role, hands-on experience implementing security tools and detection logic for enterprise teams, and the ability to think creatively to find elegant solutions to complex problems.\u003C/p\u003E\u003Cp\u003E \u003C/p\u003E\u003Cp\u003E\u003Cstrong\u003ECybersecurity Threat Hunter\u003C/strong\u003E\u003C/p\u003E\u003Cp\u003EThe Cybersecurity Threat Hunting Team is designed to proactively detect advanced threats that evade traditional security controls. Cyber Threat Hunting includes using both manual and machine-assisted capabilities and aims to find the Tactics, Techniques, and Procedures (TTPs) of advanced adversaries. The candidate must have a curious investigative mind, security background in information technology (network/systems administration), and the ability to communicate complex ideas to varied audiences.\u003C/p\u003E\u003Cp\u003EThe candidate will be a key member of the SIIRT\u0027s Threat Hunting and Adversary Simulation team responsible for actively developing hunts, translate them into an iterative process, participating in threat actor-based red team simulations, and creating new detection methodology. The focus of the Cyber Hunter is to detect, disrupt and eradication of threat actors from the enterprise network. To execute this mission, you will use data analysis, threat intelligence, and cutting-edge security technologies.\u003C/p\u003E\u003Cp\u003E\u003Cstrong\u003E \u003C/strong\u003E\u003C/p\u003E\u003Cp\u003E\u003Cstrong\u003ECybersecurity Adversary Simulation\u003C/strong\u003E\u003C/p\u003E\u003Cp\u003EThe Adversary Simulation Team operates as a tactical think tank, generating strategically relevant attack scenarios, simulating Tactics, Techniques, and Procedures (TTPs) of threat adversaries to test the organization\u0027s security posture. Collaborating with all of Cybersecurity, the Adversary Simulation team acts as a progressive, adaptive, and proactive work stream focused on testing the security effectiveness and defensive readiness of the organization as a whole.\u003C/p\u003E\u003Cp\u003E \u003C/p\u003E\u003Cp\u003EThe ideal candidate is a very experienced, seasoned, and well-rounded red team operator that is relentless and creative. This individual will have a deep adversarial mind, disciplined methodology, and a willingness to work closely and collaborate with very bright security minds on the offense and defensive sides. A strong technical background will be essential to deliver high quality results. The ideal candidate must foster good working relationships with business and IT managers to ensure the organization meet its business objectives. This position is also responsible for being involved with new developments in the industry as it relates to research on new attacks and defense mechanisms to maintain system resilience to next generation attacks.\u003C/p\u003E\u003Cp\u003E \u003C/p\u003E\u003Cp\u003E \u003Cstrong\u003ECybersecurity Incident Response\u003C/strong\u003E\u003C/p\u003E\u003Cp\u003EThe Cybersecurity Incident Response Team provides world-class cyber incident response services. As a member of the team, the individual will be responsible for performing CSIRT activities including: responding to computer security incidents, gathering forensic evidence, analyzing events based on digital artifacts, determining mitigation/remediation/security improvement opportunities, and working with stakeholders to communicate findings.\u003C/p\u003E\u003Cp\u003E \u003C/p\u003E\u003Cp\u003EThe ideal candidate has a disciplinary background in information technology such as enterprise web applications, operating systems, computer programming, networking, or system administration; proficiency in log analysis and implementing mitigation techniques; acquiring and analyzing digital evidence; and producing thorough reports, including analysis findings and lessons learned. \u003C/p\u003E\u003Cp\u003E \u003C/p\u003E\u003Cp\u003E \u003C/p\u003E\u003Cp\u003E Responsibility of the role is to design the Cybersecurity roadmap, contain potential breaches, conduct digital forensics, and deliver highly complex secure systems, cyber applications, technical projects, and regulatory and risk requirements. Drives Cybersecurity framework, roadmap, program optimization, process engineering, risk remediation, and mitigation of operational risk in a high-velocity culture by introducing technology, requirements, deliverables, gaps, and systems design. Analyzes competitive strategies, cyber technologies, metrics models, and performance indicators. Contributes to robust and innovative strategic solutions, builds resilient support for next-generation systems to solve business challenges, and enhances the control environment and executive decision-making.\u003C/p\u003E \u003C/p\u003E\u003Cp\u003E \u003Cp\u003E\u003Cstrong\u003EAt a minimum, here\u0027s what we need from you:\u003C/strong\u003E\u003C/p\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u0027s Degree in Information Security, Computer Science, Business Administration, Data Analytics, or related field\u003C/li\u003E\u003Cli\u003E4\u002B years of experience in Information Security, Computer Science, Business Administration, Data Analytics, or related field\u003C/li\u003E\u003Cli\u003EIn lieu of a degree, 6\u002B years of experience in Information Security, Computer Science, Business Administration, Data Analytics, or related field\u003C/li\u003E\u003C/ul\u003E\u003Cp\u003E \u003C/p\u003E \u003C/p\u003E\u003Cp\u003E \u003Cp\u003E\u003Cstrong\u003EPreferred Qualifications\u003C/strong\u003E\u003Cstrong\u003E\u003C/strong\u003E\u003C/p\u003E\u003Cp\u003E\u003Cstrong\u003EIf we had our say, we\u0027d also look for:\u003C/strong\u003E\u003C/p\u003E\u003Cul\u003E\u003Cli\u003E6\u002B years of experience in Information Security, Computer Science, Engineering, Data Analytics, or related field\u003C/li\u003E\u003Cli\u003EPMP, CEH, GIAC, CISM, CISSP\u003C/li\u003E\u003C/ul\u003E \u003C/p\u003E \u003Cp\u003E The same way we treat our employees is how we treat all applicants - with respect. Discover Financial Services is an equal opportunity employer (EEO is the law). We thrive on diversity \u0026 inclusion. You will be treated fairly throughout our recruiting process and without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status in consideration for a career at Discover. \u003C/p\u003E \u003Cbr\u003E\u003Cbr\u003E



  • Banking / Finance
Posted: 2019-09-04 Expires: 2019-12-12

Welcome to Discover
We strive to be the leading direct bank and payments services company. Our mission is to help people spend smarter, manage debt better, and save more to achieve a brighter financial future.

Why Work with Us?
You can make an impact. Whether it’s developing corporate strategy, innovating new services or supporting IT needs, every employee has the opportunity to be a vital part of our business and make a real difference in people’s lives. It’s the heart of what we do.


Featured Employers[ View All ]

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Lead Cybersecurity Analyst (Hunt / Red Team / Incident Response / Platform Engineer) - 50640

Riverwoods, IL 60015

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast