CrawlJobs Logo

Information Security Professional Lead Analyst

https://www.citi.com/ Logo

Citi

Location Icon

Location:
Philippines , City of Taguig

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Info Sec Prof Lead Analyst is an intermediate level position responsible for driving efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the execution of Information Security directives and activities in alignment with Citi's data security policy.

Job Responsibility:

  • Design and implement a solution for performance measurements on effectiveness of controls and overall vulnerability assessment program
  • Analyze trends on assets security health posture and report using visualization tools for program review with management and stakeholders
  • Analyze and report aggregated data from multiple data sources
  • Develop data visualization mock-ups for monitoring program data trends and communicate using analytical tools
  • Develop reports for tracking program effectiveness and update power point deck for weekly, monthly and quarterly updates
  • Develop, optimize and provide continuous support for reports and ad-hoc queries from end user
  • Create dashboards with parameters and interactive drill down functionality
  • Analyze trends on assets security health posture and report using visualization tools for program review with management and stakeholders
  • Excellent Analytical Ability - Understand the systems and data flow at a high level to evaluate if appropriate controls are in place for the standards
  • Provide timely, accurate, and actionable reporting on application vulnerability activity, trends, service levels, and areas of concern to senior management
  • Streamline and automate report creation and distribution for weekly & monthly reporting
  • Work with the Metrics reporting team to enhance and refine the metrics and key performance indicators reported to senior management and external regulatory agencies
  • Develop User acceptance test plans for testing changes to system enhancements that impact governance and compliance
  • Document business requirements related to system enhancements and submit for reviews and approvals
  • Perform data analysis from multiple systems and assess completeness of data for reporting
  • Ensure data integrity and compliance by performing data audits and data validation
  • Performs root cause analysis on metric trends and provide insight to governance team for appropriate refinements to rules

Requirements:

  • At least 7+ years of strong data analysis and report development experience
  • 7+ years of experience in information security or related technology experience required
  • At least 7+ years’ experience with Business Intelligence Reporting tools like Cognos, Tableau
  • At least 7+ years’ experience with Databases like Oracle, SQL Server, Microsoft Access
  • Strong Business Intelligence Developer Skills
  • Strong understanding of application development life cycle, CI/CD and DevOps concepts
  • Excellent Excel data analysis and Access database skills
  • Excellent SQL Skills
  • Experience with issue resolution - ability to research, identify and communicate solutions
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills

Nice to have:

Master’s degree preferred

Additional Information:

Job Posted:
April 30, 2025

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Information Security Professional Lead Analyst

Security Incident Management Analyst

The Security Incident Management Analyst is an intermediate level position respo...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant professional certifications issued by GIAC, AWS, etc., preferably GCCC, GCIH, CEH, ECSA
  • General Industry knowledge of reporting obligations pertaining to local and national laws and regulatory bodies such as OCC, SEC, ECB, MAS
  • Working knowledge of common security models (Defense-in-Depth) and frameworks (MITRE Attack, Cyber Kill Chain, STIX)
  • Working knowledge of VERIS taxonomy
  • Working knowledge of OSI model
  • Working knowledge of security and/or incident response in cloud environments
  • Working knowledge of software development best practices, including agile methods
  • Familiar with Atlassian tools
  • Previous experience working in highly regulated environment
  • Previous experience in a fusion center and/or exposure to large scale incident response
Job Responsibility
Job Responsibility
  • Work as part of a best in class ‘follow the sun’ security incident response team
  • Lead and manage incident response activities to ensure that requisite triage, containment, and eradication are completed within targeted timeframes
  • Ensure that the security incident record is complete, accurate and fit for purpose
  • Collect and analyze evidence including investigative findings and prepare to coordinate with internal and external compliance and audit personnel
  • Execute incident response meetings and communicate complex security topics
  • exhibit good judgment and discretion when initiating escalations to all levels of the organization
  • Ensure that controls are utilized daily and that non-compliance remediation is addressed by appropriate selection
  • Provide IS consulting services, including interpreting and/or clarifying information security policy, procedures, standards or concepts
  • Assist with defining and implementing information security standards to align procedures and practices in pursuit of compliance with Citigroup standards
  • Validate compliance with information security policies, practices, and procedures, and resolve a variety of information security related issues in coordination with the relevant business(es)
  • Fulltime
Read More
Arrow Right

Cybersecurity GRC Tool Analyst

Cybersecurity GRC Tool Analyst to analyse the technology requirements of the var...
Location
Location
Canada
Salary
Salary:
97600.00 - 181000.00 CAD / Year
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Information Security, Information Technology, Risk Management or a related field, or equivalent experience
  • CISSP, ISO 27001 Lead Implementer, or similar certification
  • GRC platform certifications (e.g., Archer Certified Professional, ServiceNow GRC, Drata Admin, OneTrust Certified)
  • ITIL Foundation (a plus)
  • 5-7 years of experience in Information Security, IT Governance, or Risk Management
  • 5+ years of experience working with GRC platforms (e.g., Archer, ServiceNow GRC, AuditBoard, Drata, OneTrust, or similar)
  • Expert at working with Governance Risk & Compliance platforms
  • Strong understanding of cybersecurity and compliance frameworks (e.g., NIST CSF, ISO 27001)
  • Experience with basic integrations and workflow configurations
  • Strong organizational skills and attention to detail
Job Responsibility
Job Responsibility
  • Administer and maintain the GRC platform, including configurations, workflows, and reporting dashboards
  • Support the integration of the GRC tool with key enterprise systems (e.g., asset inventory, ticketing systems, vulnerability management tools)
  • Collaborate with cybersecurity, policy, risk, compliance, and IT teams to capture business requirements and translate them into functional tool capabilities
  • Assist in onboarding and managing control frameworks (e.g., ISO 27001, SOC 2, NIST CSF, FedRAMP) within the platform
  • Monitor data quality, ensure accurate reporting, and maintain platform integrity
  • Support control owners and stakeholders in using the GRC platform for assessments, evidence collection, and tracking remediation activities
  • Maintain user roles and permissions, ensuring proper access management
  • Document processes, workflows, and platform configurations
  • Provide training and guidance to end users on tool functionality and best practices
  • Coordinate with tool vendors for issue resolution, upgrades, and enhancements
What we offer
What we offer
  • Health & Wellbeing benefits
  • Personal & Professional Development programs
  • Unconditional Inclusion environment
  • Comprehensive benefits suite supporting physical, financial and emotional wellbeing
  • Fulltime
Read More
Arrow Right

Senior Detection Engineer

This is a detection engineering role that leverages knowledge of monitoring, ana...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.marriott.com Logo
Marriott Bonvoy
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Sciences or related field or equivalent experience/certification
  • 3+ years of collective experience in Splunk SIEM (Splunk Enterprise Security) threat detection use case development or UEBA (Exabeam) use case development for insider threat use case development
  • 5+ years of experience in security functions such as SOC, CIRT, security engineering, risk management, vulnerability management or technical infrastructure operations, administration, or systems engineering
  • scripting or programming language, including Python
  • Current information security certification such as Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) preferred
  • offensive and defensive security certifications such as CEH, IGAC Cyber Defense, OSCP or other related certifications preferred
  • Splunk Certification, including Splunk Enterprise Security Certified Admin preferred
  • use case development experience on the Exabeam platform preferred
  • working knowledge of the NIST Cyber Security Framework and ISO/IEC 27001:2022 preferred
  • working knowledge of the MITRE ATT&CK Framework preferred
Job Responsibility
Job Responsibility
  • Lead collaboration sessions within the cyber security tower and other business units to devise security monitoring use cases
  • engage and collaborate with other security engineers and architects as needed to keep pace with the evolution of corporate infrastructure and applications and share that knowledge with peers as appropriate
  • document prospective security monitoring use cases with MITRE ATT&ACK mappings using standard templates and methodologies
  • inform and consult other cyber ops teams of required data onboarding and integrations for use case development
  • develop analytics, correlation searches, dashboards, reports and alerts within the SIEM and UEBA platforms
  • solicit feedback for pre-production security monitoring content through peer review process and user acceptance testing for tuning
  • document developed security monitoring content in a documentation registry using department standard templates and methodologies
  • manage field mapping and transmission of security monitoring alerts to the security incident response platform for SOC analyst consumption as outlined in process documentation
  • provide governance support for the content development function entailing content development standards compliance, change management approvals for SIEM or UEBA content, and lifecycle management of developed security monitoring content
  • service operational requests in queue such as analytics content performance tuning, filtering, search refinement, parsing issues
  • Fulltime
Read More
Arrow Right

Information Security Specialist/Analyst III

The Information Security Specialist/Analyst III reports to the Manager, Security...
Location
Location
United States
Salary
Salary:
Not provided
muschealth.org Logo
MUSC Health
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience
  • or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience
  • or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required
  • Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.)
  • Strong analytical and problem-solving skills with the ability to make decisions under pressure
  • Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools
  • Familiarity with cloud security (Azure, AWS) and identity management solutions
  • Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices
  • Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language
  • Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks
Job Responsibility
Job Responsibility
  • Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure
  • Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches
  • Perform cyber security incident handling, tracking and reporting
  • Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts
  • Respond to relevant service requests received from end users (e.g. for investigation of security events)
  • Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents
  • Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities
  • Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements
  • Conduct vulnerability assessments to identify security risks and report findings to system owners
  • Manage workflows to ensure that protected assets are properly assessed in a timely manner
  • Fulltime
Read More
Arrow Right

Acquisition Analyst

The candidate will be required to create and maintain a single Program Integrate...
Location
Location
United States , Redstone Arsenal, AL
Salary
Salary:
Not provided
qed-analytics.com Logo
QED Analytics Inc
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree Required
  • Must have 5-10 years' experience
  • Experience using MS Project Professional
  • Capable of leading and executing tasks associated with Integrated Master Schedule (IMS) planning, development, execution, and analysis for complex weapon systems
  • Proficiency in Milestones Professional and working knowledge of @Risk for MS project is highly desired
  • Demonstrated experience supporting and interacting on a daily basis with high level DOD Officials (06 and above, GS equivalent), sitting on-site with the DOD Program
  • Demonstrated MS Office skills, particularly Excel and PowerPoint and relational database tools for data management (and reporting) are required
  • SECRET or greater Security Clearance
Job Responsibility
Job Responsibility
  • Create and maintain a single Program Integrated Master Schedule (IMS) using Microsoft Project and/or Primavera P6
  • Incorporate updating status information into the Government IMS from the prime contractor IMS and Govt organizations
  • Provide critical path impact analysis and recommend conflict resolution actions as required to the Government Program Manager
  • Provide additional program top level reports of the Program IMS using Milestones Professional
  • Manipulate and update schedules during meetings and respond to questions from customers regarding milestones and changes
  • Aid with developing technology-based solutions to provide useful data in an easy-to-understand format using Contracts Manpower Dashboards, DAO Portal Management, Helpdesk Management, and Qlik dashboard development
  • Supports Defense Acquisition, Earned Value and Contracts on all strategic workforce development issues including manpower, retention, staffing, and other functional operations within the Missile Defense Agency
  • Administration of in-house database PRIDE (Personnel Resource Internet Database Environment) maintaining accuracy of records through weekly updates, managing move logistics/space assignments
  • Trusted agent duties for MDA incentive awards, provide weekly reports of incentive awards totals and percentage obligated from Acquisition, Contracts, and Earned Value programs
Read More
Arrow Right
New

Manager, IT Cybersecurity

The Cybersecurity Manager leads and coordinates cybersecurity operations, govern...
Location
Location
United States , Tucker
Salary
Salary:
164800.00 - 206000.00 USD / Year
Georgia System Operations
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor Degree in Cybersecurity, Computer Science, IT, Information Systems, or related field
  • 10 years in the area of Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology
  • Associates Degree in Computer Science, Business Administration, IT, Engineering, or related field with at least 14 years of experience with Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology with at least 5 years of experience in a supervisory or leadership role
  • Eighteen (18) years of direct experience in the experience areas defined above in addition to at least 5 years of experience in a supervisory or leadership role
  • Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) desired
  • Strong verbal and written communication skills
  • Excellent organization and time management skills
  • Analytical and creative problem-solving skills
  • Ability to establish and maintain effective working relationships as necessitated by the work
Job Responsibility
Job Responsibility
  • Strategic Management: Works closely with IT and business stakeholders to understand their IT security needs and aligns these needs with strategic initiatives
  • Develops and maintains IT security policies and processes
  • Identifies, prioritizes, and develops new solution ideas and leads the implementation of chosen initiatives that integrate company strategy and best practices
  • Ensures the department's ability to manage change based on evolving business needs and security requirements
  • Relationship Management: Builds and maintains positive relationships with IT peers and business stakeholders, ensuring a high level of customer satisfaction
  • Understands stakeholders' requirements and stays apprised of their operating environments to ensure accuracy and value in the security services rendered
  • Communicates clearly, effectively, and on a timely basis, fostering an environment where stakeholders feel comfortable bringing issues, concerns, and opportunities for exploration
  • Financial Management: Manages the budget for IT Cybersecurity, ensuring adherence to budgets and strategic plans
  • Directs the preparation, review, and consolidation of department budgets, projections, and variance analysis
  • Develops and manages annual budget, performs monthly forecasts, and oversees routine cost-management duties, such as overseeing expenditures and developing and administering contracts and purchase orders
What we offer
What we offer
  • Comprehensive medical, dental, and vision coverage
  • A strong retirement program
  • Career development
  • Flexible work schedules
  • Fulltime
Read More
Arrow Right

Manager – Security Architecture and Strategy

The Manager, Security Architecture and Strategy, is a key role in continent secu...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.marriott.com Logo
Marriott Bonvoy
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Information Technology, Information Security, Cybersecurity or related field
  • 3+ years IT/ information security work experience, preferably in a large organization
  • Experience in reviewing Security Architectures and explaining security risks/gaps as well as mitigation strategies is highly desirable
  • Professional certifications related to security assessment, such as CISA, CRISC, PCI ISA, ISO/IEC 27001 Lead Auditor, etc.
  • The coordinator must have strong interpersonal communication skills, as well as organizational skills. Project management experience is also desirable.
  • Fluent in English, both spoken and written.
  • Strong working knowledge of IT service management (e.g., ITIL-related disciplines)
  • Ability to communicate Security Requirements for areas including but not limited to: Cloud Computing, Application Development, IAM, Cryptography, and Infrastructure design and standards to a diverse audience.
  • Ability to present the process to all levels of audience, be comfortable answering questions around the process, gather and document feedback from these presentations and bring that back to the Security Architect for future enhancements.
  • Experience in creating presentations in PowerPoint, and comfort in presenting to C level executives.
Job Responsibility
Job Responsibility
  • Contributes to, evaluates, and supports the documentation, and validation processes necessary to assure that associates, information technology systems and business processes meet the organization’s information assurance, security, and privacy requirements.
  • Consults with customers to gather and evaluate functional requirements and provides these to the Security Architect team.
  • Provides sound advice and recommendations to leadership and staff on a variety of relevant topics within the pertinent subject domain
  • Works with the Security Architect Analysts to monitor ongoing project activities, intake of new projects and monitoring of the Security Engagement Process to meet team objectives for performance.
  • Develops specific goals and plans to prioritize, organize, and accomplish work.
  • Champions leaders’ vision for product and service delivery.
  • Makes and executes the necessary decisions to keep moving forward toward achievement of goals.
  • Provides direction and assistance to other teams regarding projects.
  • Determines priorities, schedules, plans and necessary resources to promote completion of any projects on schedule.
  • Analyzes information and evaluates results to choose the best solution and solve problems.
  • Fulltime
Read More
Arrow Right
New

Manager – Security Architecture and Strategy

The Manager, Security Architecture and Strategy, is a key role in continent secu...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.marriott.com Logo
Marriott Bonvoy
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Information Technology, Information Security, Cybersecurity or related field
  • 3+ years IT/ information security work experience, preferably in a large organization
  • Experience in reviewing Security Architectures and explaining security risks/gaps as well as mitigation strategies is highly desirable
  • Professional certifications related to security assessment, such as CISA, CRISC, PCI ISA, ISO/IEC 27001 Lead Auditor, etc.
  • Strong interpersonal communication skills
  • Organizational skills
  • Project management experience is desirable
  • Fluent in English, both spoken and written
  • Proficiency in Chinese and additional language skills will be an advantage
Job Responsibility
Job Responsibility
  • Contributes to, evaluates, and supports the documentation, and validation processes necessary to assure that associates, information technology systems and business processes meet the organization’s information assurance, security, and privacy requirements
  • Consults with customers to gather and evaluate functional requirements and provides these to the Security Architect team
  • Provides sound advice and recommendations to leadership and staff on a variety of relevant topics within the pertinent subject domain
  • Works with the Security Architect Analysts to monitor ongoing project activities, intake of new projects and monitoring of the Security Engagement Process to meet team objectives for performance
  • Develops specific goals and plans to prioritize, organize, and accomplish work
  • Champions leaders’ vision for product and service delivery
  • Makes and executes the necessary decisions to keep moving forward toward achievement of goals
  • Provides direction and assistance to other teams regarding projects
  • Determines priorities, schedules, plans and necessary resources to promote completion of any projects on schedule
  • Analyzes information and evaluates results to choose the best solution and solve problems
  • Fulltime
Read More
Arrow Right