Cybersecurity Operations Analyst, Third Shift
Listed on 2025-12-24
-
IT/Tech
Cybersecurity, IT Consultant
Cybersecurity Operations Analyst, Third Shift
Join to apply for the Cybersecurity Operations Analyst, Third Shift role at Huntington National Bank
This employer will not sponsor applicants for the following work visas: F-1 student, H-1B worker, O-1 worker, TN worker, E-3 worker. Applicants must be currently authorized to work in the United States on a full-time basis.
Hybrid role: 4 days in office.
Summary
The Cybersecurity Operations Analyst reviews security events to identify and prioritize potential threats and identify trends utilizing various tools and technologies. Analyze available data sources, security tools, and threat trends to identify attacks against the enterprise. Perform incident response, issue resolution, assessment, and communication of security risks to the enterprise. The Cybersecurity Operations Analyst recommends and implements defensive measures derived from information collected from a variety of sources.
You will work closely with other teams within Cybersecurity and with IT Operations.
- Participate in the day-to-day security operations monitoring and response from the Cybersecurity Operations Center.
- Perform malware analysis, reverse engineering, and de-obfuscation techniques.
- Evaluate, respond, and mitigate alerts that originate from the SIEM and the Cybersecurity product suite, e.g. NGFWs, IDS/IPS, Anti-virus, Web Application Firewalls, NAC Solution, etc.
- Implement or recommend mitigations including the creation and development of new alerts and rules within the various cyber security tools.
- Be able to analyze and identify malicious activity during the various attack stages.
- Maintain a high level of technical expertise on Cyber Security defense-in-depth technology and best practices by performing ongoing research and engagement to maintain awareness of industry trends, best practices.
- Collaborate with the Cyber Security Engineering and IT Operations teams.
- Performs other duties as assigned.
- Bachelor’s degree
- 3 years of experience in Cybersecurity
- Familiar with common attack vectors, DDoS attacks, Phishing, web & application attacks, and malware
- Knowledge of common critical network protocols and layer 7 technologies such as SMTP, HTTP, HTTP/S, SSL/TLS, DNS, FTP, SSH, and others
- Familiar with a SIEM platform and various cyber security technologies such as EDR, AV, IDS/IPS, and WAFs
- Familiarity with advanced persistent threats and their tactics, techniques, and procedures
- Familiarity with the incident response Kill Chain
- Fundamental understanding of Windows, Mac OSX, and Linux operating systems
- Fundamental understanding of OSI model, basic networking and troubleshooting concepts
- Experience with programming or scripting, including Power Shell, Bash, Python, Yara, and Perl
- Intermediate knowledge of incident response frameworks and handling procedures
- Understanding and knowledge of various log formats from a variety of network and computer devices
- Knowledge of Cyber risks and threats related to Cyber attackers
- Knowledge of recent Cyber events and interpreting kill chain process and threat impacts
- Presentation, analytical, and critical-thinking skills
Occasional travel may be required.
Third Shift
Hours:
Thur 1:00 am‑7:30 am, Thur‑Sat 7 pm‑7:30 am.
Exempt Status:
Yes (not eligible for overtime pay).
Workplace Type:
Office. Certain positions outside our branch network may be eligible for a flexible work arrangement, combining in‑office and work‑from‑home.
Huntington is an Equal Opportunity Employer.
#J-18808-Ljbffr(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).