The Senior Cybersecurity Analyst will be working on external defense team to ensure indications of compromise are promptly identified and stakeholders are informed with actionable and complete information. This role will assist and coordinate with incident response staff, threat intelligence, vulnerability management, and perimeter security teams during response activities and cyber investigations. This position works closely with our ISO for each Business Unit and directly with internal and external customers.
Looking for an energetic, hard charging individual able to keep up in an exciting and fast-moving Perimeter security team that is engaged in several high-profile security projects to enhance Fidelity’s security posture. The candidate will be immersed in a quick changing environment in a very rapid changing threat landscape, working with numerous security professionals. The qualified candidate must be adaptable and able to work in a fast-paced environment where learning new skills and understanding new system architectures quickly is a key to success. The job involves performing functions related to Network and Perimeter specialization including Web Application Firewall, Email Security, IDS/IPS, Change Management. Rotational on-call coverage, including weekends, is required.
The Expertise You Have and The Skills You Bring
5 to 7 years of security experience desired, preferably in a matrix-driven corporate environment.
60% of your time will be in Perimeter Operations, 20% of your time will be to manage internal stakeholders and remaining in driving automation efforts.
Security experience with any WAF provider, API configuration and analyzing traffic logs.
Strong understanding of core networking concepts (e.g. – TCP/IP, DNS, HTTP, proxy, load-balancing, etc.).
Functional experience with Splunk, SIEM, or other analysis technologies.
Experience with cloud solutions such as AWS or other IaaS/PaaS/SaaS environments.
Ability to interact with both technical and non-technical staff, including management and executives, with experience articulating technical material in business terms.
Functional understanding of network controls and policies to combat cyber threats.
Strong experience in Email Security, Email and Web Advance Threat Protection, DNS, DDoS, IDS/IPS and cloud security. Analyzing email, DNS and DDoS attack patterns to improve protections. Monitoring for baseline deviations for detecting external threat attacks and automate to proactively mitigate.
Expert in DMARC and outbound email enforcement.
Perimeter and cloud security Expert with an outstanding understanding of the latest practices and trends in edge security.
Reviewing policy enforcement change requests; interviewing submitters who have requested security configuration changes and require additional requirements gathering.
Outstanding knowledge in Perimeter and cloud security
Expertise in Perimeter Security Ops including WAF, API Security, Email Security
Web Application Firewall (WAF) Engineer & WAF Rules Fine Tuning.
Evaluating, deploying, and managing Akamai / AWS / Azure WAF security modules.
Analyzing web and network traffic patterns to identify anomalies and improve protections.
Reviewing policy enforcement change requests; interviewing submitters who have requested security configuration changes and require additional requirements gathering.
Knowledge of Perimeter tools. The main area will be in areas of external defense for the WAF.
Desired knowledge of additional tools that include Email Security (EOP), Network IDS/IPS (Firepower), WAF, DDoS Control and SIEM.
Knowledge of Agile, Cloud, DevSecOps, Open Source and a programming language is of substantial advantage.
Passionate about cyber security, motivated to continuously learn and share your knowledge.
Intellectually curious and therefore remain abreast of new technologies and developments relating to technical products that might be used enterprise wide and software delivery methodologies.
Team player with excellent interpersonal & communication skills (written and verbal)
Create strong, defensible platform to protector customer data.
Ability to make information security risk determinations based on intelligence analysis.
Understanding cyber threats, malicious cyber threat actor motivations, and capabilities relevant to regions of interest.
Certifications: