CrawlJobs Logo

Email Security Senior Analyst

https://www.citi.com/ Logo

Citi

Location Icon

Location:
Hungary , Budapest

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Email Security Senior Analyst is responsible for providing expert support and leadership to email security and brand protection functions, projects, and programs. They will be responsible for interactions with vendors, employees, and stakeholders of the team’s services. The Email Security Senior Analyst will provide operational support, intelligence gathering, project and program management, analysis and report development, publishing, and briefing. Besides managing aspects of the day-to-day function of these programs, he or she will partner with various cyber and information security teams to enhance current solutions and find new solutions to stay ahead of the ever-changing cyber threat. The position will require substantial collaboration with other members of the team and across other Cyber Security Operations teams ensuring appropriate email security support and solutions are triaged appropriately.

Job Responsibility:

  • Provide expertise and experience to existing and future functions and projects focused on email threats and controls.
  • Actively monitor and research cyber threats with a direct or indirect impact to the Citi brand
  • Analyze and provide oversight of analysis of email threats and controls
  • Provide leadership, solution design, and hands-on development support for email security controls
  • Develop and manage processes to track identified incidents to resolution
  • Develop weekly, monthly, quarterly, and annual metrics and reports as needed
  • Develop written analytical reports and give presentations on findings
  • Triage information received from vendors and process that information through previously defined internal workflows
  • Manage third party vendors to ensure proper delivery of services
  • Manage meetings with internal stakeholders to address open issues and identify process improvements
  • Actively engage in liaison activities with intelligence communities, industry associations, peer institutions, and information sharing communities
  • Apply developed communication and diplomacy skills to guide and influence decision makers
  • Keep up to date with the ever-changing cyber security landscape to remain relevant and knowledgeable through internal and external certifications.

Requirements:

  • Highly technical and analytical expertise, with a proven deep background (preferred 5+ years’ IT experience in addition to cybersecurity) in technology design, implementation, and delivery.
  • Minimum 3+ years working in security engineering or security operations role, with a focus on email security
  • Strong experience with configuration, administering, troubleshooting email routing and filtering in Exchange, Exchange Online, Proofpoint and other enterprise level email security gateways (such as inbound routes, whitelists, email firewall rules, spam/AV, logging/reporting, TAP, TRAP, domain rewrites, secure messaging and recipient verification).
  • Experience in analyzing domain email activity and deploying SPF, DKIM and DMARC authentication
  • Strong understanding of and demonstrated experience with the tools and sources available to conduct email and threat analysis
  • Experience with enterprise phishing defense concepts and technologies
  • Cross-functional understanding of email operations, security practices and the user experience
  • Knowledge and experience creating and maintaining policies, standard operating procedures (SOPs) and technical documents
  • Ability to identify and develop new processes to address cross-functional and cross-business requirements and implement
  • Ability to manage projects and ensure tasks are being met timely. Work with leaders of Cyber Security Operations teams to track, drive and report on strategic initiatives.
  • Ability to organize and appropriately prioritize multiple, ongoing tasks via efficient time management and forecasting. Project management skills a plus
  • Ability to work independently, as well as in team situations, to help internal and external customers achieve desired results
  • Experience with data analysis and data visualization
  • Demonstrated capability to produce written products on a reoccurring basis by working with cross-functional and cross-enterprise teams
  • Strong written and verbal communication and presentation skills
  • Communication and presentation skills to senior client and senior internal stakeholder meetings
  • Weekend and holiday coverage may be required
  • Bachelor’s degree or equivalent work experience
  • IS Certifications are desired (CISSP, GSEC, GCFA, GREM, Security+, CISA, CISM).
  • Email vendor certifications a plus.

Nice to have:

  • Project management skills a plus
  • Email vendor certifications a plus.
What we offer:
  • Cafeteria Program
  • Home Office Allowance (for colleagues working in hybrid work models)
  • Paid Parental Leave Program (maternity and paternity leave)
  • Private Medical Care Program and onsite medical rooms at our offices
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to a wide variety of learning and development programs, online course libraries and upskilling platforms, such as Udemy and Degreed
  • Flexible work arrangements to support you in managing work - life balance
  • Career progression opportunities across geographies and business lines
  • Socially active employee communities with diverse networking opportunities.

Additional Information:

Job Posted:
January 15, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Email Security Senior Analyst

Security Analyst

We are seeking a proactive and detail-oriented Security Analyst (Tier 1-2) for a...
Location
Location
United States , Charlotte
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 1-3 years of experience in a security analyst or related IT security role
  • strong understanding of server environments and security event workflows
  • experience with Proofpoint, Exchange, and sandbox tools
  • familiarity with security investigation techniques and threat analysis
  • ability to manage and prioritize a high volume of alerts (approx. 50/week)
  • excellent written and verbal communication skills
  • self-starter with a keen attention to detail
Job Responsibility
Job Responsibility
  • perform Tier 1-2 triage and analysis of security incidents
  • monitor, investigate, and respond to alerts using a variety of tools and technologies
  • utilize Proofpoint and sandboxing tools for email threat detection and analysis
  • work within Exchange to identify and mitigate potential email threats
  • analyze logs and events across various systems for suspicious activity
  • escalate complex incidents and assist with remediation efforts
  • collaborate with senior analysts and other IT teams to ensure timely resolution
  • document findings and contribute to incident response reports
What we offer
What we offer
  • medical insurance
  • vision insurance
  • dental insurance
  • life insurance
  • disability insurance
  • enrollment in company 401(k) plan
  • Fulltime
Read More
Arrow Right

Senior Business Analyst

FinXL IT is looking for a Senior Business Analyst to lead the strategic evolutio...
Location
Location
Australia , Sydney
Salary
Salary:
Not provided
finxl.com.au Logo
FinXL
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Senior Business Analyst with extensive email proxy/email security gateway experience
  • Demonstrated experience and/or understanding of mail flows and system connectors
  • Technical acumen across Exchange Online Protection and Defender for O365
  • Demonstrated experience in process modelling and requirements analysis
  • Previous delivery in complex, regulated industries with dispersed teams
  • Expertise in Project Methodology Frameworks and best practices
  • Exceptional communication and stakeholder influencing skills
Job Responsibility
Job Responsibility
  • Facilitate workshops to capture complex functional and non-functional requirements for email security migrations and tenant-to-tenant consolidations
  • Document "as-is" and "to-be" mail flow architectures, identifying bottlenecks in relay services or third-party integrations
  • Evaluate and select enterprise email security gateways (e.g., Proofpoint, Mimecast, or Microsoft Defender)
  • Define acceptance criteria and oversee User Acceptance Testing for global messaging changes to ensure zero business disruption
  • Contribute to Change and Risk Impact Assessments and high-level designs
  • Conduct third-party risk assessments of applications and systems
  • Manage extensive vendor engagements to ensure seamless service transition
What we offer
What we offer
  • Opportunity to work on a high-priority cybersecurity migration project
  • Be the bridge for technical requirements between vendors and business
Read More
Arrow Right

Senior Business Analyst

FinXL is seeking a Senior Business Analyst to join our team at a leading commerc...
Location
Location
Australia , Sydney
Salary
Salary:
Not provided
finxl.com.au Logo
FinXL
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience as a Senior Business Analyst on Cyber Security initiatives
  • Strong understanding of mail flows and system connectors
  • Technical acumen across Exchange Online Protection and Defender for O365
  • Demonstrated experience in process modelling and requirements analysis
  • Previous delivery in complex, regulated industries with dispersed teams
  • Expertise in Project Methodology Frameworks and best practices
  • Exceptional communication and stakeholder influencing skills
Job Responsibility
Job Responsibility
  • Lead analysis for migrating Mimecast services to Microsoft 365 native toolsets
  • Gather and document business and functional requirements for email security
  • Execute application and process mapping for email archiving and retention
  • Develop Business Acceptance Criteria and Requirements Traceability Matrixes
  • Contribute to Change and Risk Impact Assessments and high-level designs
  • Conduct third-party risk assessments of applications and systems
  • Manage extensive vendor engagements to ensure seamless service transition
What we offer
What we offer
  • Opportunity to work on a high-priority Cyber Security migration project
  • Be the bridge for technical requirements between vendors and business
  • Fulltime
Read More
Arrow Right
New

Senior Information Security Analyst - Application Security Champion

Wells Fargo is seeking a Senior Information Security Engineer.
Location
Location
India , Bengaluru
Salary
Salary:
Not provided
https://www.wellsfargo.com/ Logo
Wells Fargo
Expiration Date
March 29, 2026
Flip Icon
Requirements
Requirements
  • 4+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
  • 4+ years of Application Security Champion experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
  • 4+ years of overall Information/Cyber security experience with a bachelor's degree or higher in Engineering or Computer or Information technology
  • 2+ years of experience in at least one of the following practices like Security Requirements, Application Threat Modeling, Static Analysis, Application Security Risk Assessments, Security Design requirements
  • Knowledge and experience in identifying and suggesting mitigations to OWASP top 10, CWE/SANS top 25 to development teams
  • Ability to manage multiple priorities in a fast-paced dynamic environment
  • Advanced problem-solving skills, ability to develop effective long-term solutions to problems
  • Excellent verbal and written communication skills
  • Excellent inter-personal skills contributing to cordial team environment
  • Knowledge and understanding of secure SDLC (System Development Life Cycle) methodologies
Job Responsibility
Job Responsibility
  • Lead or participate in computer security incident response activities for moderately complex events
  • Conduct technical investigation of security related incidents and post incident digital forensics to identify causes and recommend future mitigation strategies
  • Provide security consulting on medium projects for internal clients to ensure conformity with corporate information, security policy, and standards
  • Design, document, test, maintain, and provide issue resolution recommendations for moderately complex security solutions related to networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security
  • Review and correlate security logs
  • Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity
  • Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives
  • Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals
  • Reviewing security requirements and security design submissions by application teams. Submissions will either be approved or rejected based on evaluation and comparison to systems of record
  • Provide information security consultation to improve awareness and compliance with Enterprise Application Security Program (EASP) policy, processes, and standards
  • Fulltime
Read More
Arrow Right

Senior Analyst

The Senior Analyst (Briefer) focus is the development, quality control, and deli...
Location
Location
United States , Fort Belvoir
Salary
Salary:
Not provided
chickasaw.com Logo
Chickasaw Nation Industries, Inc (CNI)
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must possess an active Top Secret (TS) security clearance at the time of proposal submission and be able to attain Sensitive Compartmented Information (SCI) access by the issuance of the contract
  • Must be willing to undergo and pass a Counterintelligence Polygraph (CI Poly)
  • Must be a U.S. Citizen
  • Must obtain/retain a government background investigation commensurate with position requirements
  • Must have extensive experience in a Network Operations Center (NOC) environment
  • Possesses a results-focused mindset and superior communication skills (verbal and non-verbal) to effectively interface with military officials and senior leadership
  • Expertise in Microsoft Office and SharePoint to produce high-quality briefings and reports
  • Knowledge of the Military Decision Making Process (MDMP) and Army Intelligence processes
  • Experience as an action officer in an Army tactical, Army strategic, or Joint strategic military intelligence organization
  • Demonstrated experience operating at a Division level or higher
Job Responsibility
Job Responsibility
  • Responsible for developing all briefings, documentation, and reports covering the entire scope of activities for the Transport Network Operations
  • Develops, quality checks, and disseminates the daily Critical System Status Report via email to senior leadership
  • Provides in-person Critical System Status Report briefings to senior leadership daily (currently scheduled for 0730, subject to change)
  • Ensures the Readiness Dashboard or other provided status medium is updated within 30 minutes of any changes to system status or troubleshooting efforts
  • Coordinates all authorized system outages and facilitates effective knowledge sharing between multiple offices and personnel
  • Ensures that 95% of reports are delivered on time and 95% of submitted briefings are error-free
  • Plans daily activities within the guidelines of company policy, job description, and supervisor’s instruction to maximize personal output
  • Responsible for aiding in own self-development by being available and receptive to all training made available by the company
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • Company Life Insurance
  • Short-Term and Long-Term Disability Insurance
  • 401(K) Immediate Vesting
  • Professional Development Assistance
  • Legal Aid Assistance Program
  • Family Planning / Fertility Assistance
  • Personal Time Off
  • Fulltime
Read More
Arrow Right

Senior Analyst

The Senior Analyst (Briefer) focus is the development, quality control, and deli...
Location
Location
United States , Fort Belvoir
Salary
Salary:
Not provided
chickasaw.com Logo
Chickasaw Nation Industries, Inc (CNI)
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must possess an active Top Secret (TS) security clearance at the time of proposal submission and be able to attain Sensitive Compartmented Information (SCI) access by the issuance of the contract
  • Must be willing to undergo and pass a Counterintelligence Polygraph (CI Poly)
  • Must be a U.S. Citizen
  • Must obtain/retain a government background investigation commensurate with position requirements
  • Must have extensive experience in a Network Operations Center (NOC) environment
  • Possesses a results-focused mindset and superior communication skills (verbal and non-verbal) to effectively interface with military officials and senior leadership
  • Expertise in Microsoft Office and SharePoint to produce high-quality briefings and reports
  • Knowledge of the Military Decision Making Process (MDMP) and Army Intelligence processes
  • Experience as an action officer in an Army tactical, Army strategic, or Joint strategic military intelligence organization
  • Demonstrated experience operating at a Division level or higher
Job Responsibility
Job Responsibility
  • Responsible for developing all briefings, documentation, and reports covering the entire scope of activities for the Transport Network Operations
  • Develops, quality checks, and disseminates the daily Critical System Status Report via email to senior leadership
  • Provides in-person Critical System Status Report briefings to senior leadership daily (currently scheduled for 0730, subject to change)
  • Ensures the Readiness Dashboard or other provided status medium is updated within 30 minutes of any changes to system status or troubleshooting efforts
  • Coordinates all authorized system outages and facilitates effective knowledge sharing between multiple offices and personnel
  • Ensures that 95% of reports are delivered on time and 95% of submitted briefings are error-free
  • Plans daily activities within the guidelines of company policy, job description, and supervisor’s instruction to maximize personal output
  • Responsible for aiding in own self-development by being available and receptive to all training made available by the company
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • Company Life Insurance
  • Short-Term and Long-Term Disability Insurance
  • 401(K) Immediate Vesting
  • Professional Development Assistance
  • Legal Aid Assistance Program
  • Family Planning / Fertility Assistance
  • Personal Time Off
  • Fulltime
Read More
Arrow Right

Security Threat Intelligence and Hunting Analyst

The Security Threat Intelligence and Hunting Analyst role at NTT DATA involves a...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree or equivalent in computer science, information technology or security or related field
  • Relevant security certification(s) such as GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), and GIAC Certified Forensic Analyst (GCFACTIA, CompTIA Cybersecurity Analyst (CySA+), GCTI, FOR508 preferred
  • Seasoned demonstrated experience in a similar role
  • Seasoned demonstrated experience gained within a global technology organization
  • Ability to apply critical thinking skills to a situation and make a decision based on the information to hand
  • Good understanding of computer systems, software and technology in general
  • Excellent written and verbal communication
  • Ability to research topics and find information relevant to their work
  • Ability to interpret large amounts of data and identify important details to identify potential threats and vulnerabilities
  • Seasoned proficiency in threat hunting methodologies, including familiarity with tools and techniques for proactive detection of threats
Job Responsibility
Job Responsibility
  • Reads reports, makes risk assessments, works to detect the source of attacks and tests current defenses against threats
  • Advises on analysis enabling organization to make decisions on how to improve security measures and respond to attacks
  • Monitors security alerts and maintains awareness of new threats and vulnerabilities in order to identify potential risks
  • Analyses data from various sources, including network traffic, email logs, malware files, web server logs, DNS records, etc. to identify cybersecurity risks
  • Develops and maintains threat intelligence databases containing information about cybercrime tactics, techniques, and procedures (TTPs) used by hackers or other actors targeting the organization’s assets
  • Participates in Incident Response activities as necessary to identify and contain new threats
  • Conducts investigations into potential threats by collecting data from multiple sources and analyzing it to identify patterns or other significant pieces of information that indicate a specific threat may be occurring or has occurred previously
  • Communicates with senior leaders and also executives and other stakeholders on security matters to raise awareness of potential risks and recommend solutions
  • Conducts regular audits of security measures to identify vulnerabilities that could be exploited by unauthorized users
  • Reviews security policies to ensure compliance with industry regulations and best practices
  • Fulltime
Read More
Arrow Right

Security Threat Intelligence and Hunting Analyst

As a Security Threat Intelligence and Hunting Analyst, you will analyze and dete...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree or equivalent in computer science, information technology or security or related field
  • Relevant security certification(s) such as GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), and GIAC Certified Forensic Analyst (GCFACTIA, CompTIA Cybersecurity Analyst (CySA+), GCTI, FOR508 preferred
  • Seasoned demonstrated experience in a similar role
  • Seasoned demonstrated experience gained within a global technology organization
  • Ability to apply critical thinking skills to a situation and make a decision based on the information to hand
  • Good understanding of computer systems, software and technology in general
  • Excellent written and verbal communication
  • Ability to research topics and find information relevant to their work
  • Ability to interpret large amounts of data and identify important details to identify potential threats and vulnerabilities
  • Seasoned proficiency in threat hunting methodologies, including familiarity with tools and techniques for proactive detection of threats
Job Responsibility
Job Responsibility
  • Reads reports, makes risk assessments, works to detect the source of attacks and tests current defenses against threats
  • Advises on analysis enabling organization to make decisions on how to improve security measures and respond to attacks
  • Monitors security alerts and maintains awareness of new threats and vulnerabilities in order to identify potential risks
  • Analyses data from various sources, including network traffic, email logs, malware files, web server logs, DNS records, etc. to identify cybersecurity risks
  • Develops and maintains threat intelligence databases containing information about cybercrime tactics, techniques, and procedures (TTPs) used by hackers or other actors targeting the organization’s assets
  • Participates in Incident Response activities as necessary to identify and contain new threats
  • Conducts investigations into potential threats by collecting data from multiple sources and analyzing it to identify patterns or other significant pieces of information that indicate a specific threat may be occurring or has occurred previously
  • Communicates with senior leaders and also executives and other stakeholders on security matters to raise awareness of potential risks and recommend solutions
  • Conducts regular audits of security measures to identify vulnerabilities that could be exploited by unauthorized users
  • Reviews security policies to ensure compliance with industry regulations and best practices
  • Fulltime
Read More
Arrow Right