AVP, Information Security Analyst
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, Information Security
Position Summary
Overview:
The AVP Security Analyst is a mid-level role within TCW's Information Security team, with a strong focus on vulnerability management and cloud security (Azure). The team is responsible for safeguarding the confidentiality, integrity, and availability of the firm’s data and technology assets through proactive monitoring, response, and the continuous improvement of information security controls and processes. The AVP will play a key role in strengthening the firm’s security posture by driving vulnerability management activities, advancing Azure security controls, and collaborating with both technology and business teams to reduce risk across the enterprise.
Purpose:
The AVP Security Analyst will support and lead the enhancement of TCW’s information security operations by managing the vulnerability lifecycle, analyzing and assessing threats, and contributing to cloud and enterprise incident response activities. The AVP will work closely with experienced security professionals and cross-functional partners to identify risks, validate security events, and coordinate remediation efforts. This position requires strong technical expertise, hands-on experience with cloud security and vulnerability management, and the ability to operate effectively in a dynamic, regulated environment.
Duties
- Lead the full vulnerability management lifecycle (scanning, assessment, prioritization, reporting, and remediation) across cloud and on-prem environments.
- Support and enhance asset discovery and management by leveraging tools such as Armis to ensure complete visibility of cloud, on-prem, and hybrid assets, enabling more effective vulnerability management, threat detection, and incident response.
- Implement, monitor, and improve Azure-native security controls, including identity, workload, and data protection, as well as CSPM and CNAPP tooling for cloud risk management.
- Investigate, validate, and escalate suspicious or anomalous activity through available tools and telemetry.
- Provide strong support for incident response, including investigation, containment, remediation, and lessons learned across the lifecycle of security incidents
- Manage and optimize SIEM and SOC operations, including detection engineering, correlation rules, alert handling, and escalation processes (Microsoft Sentinel preferred).
- Configure, manage, and maintain EDR capabilities to ensure effective endpoint visibility, protection, and response.
- Conduct technical and practical threat hunting in Azure and hybrid environments to proactively detect and mitigate risks.
- Utilize basic scripting/querying skills (KQL, Power Shell, Python) to support investigations, analysis, and automation efforts.
- Partner with infrastructure, application, and cloud teams to assess existing controls and implement security improvements.
- Participate in regular security operations reviews and recommend improvements to processes, tools, and controls.
- Stay current on evolving cloud security risks, vulnerability trends, and attack techniques, with emphasis on Azure.
- Perform other security-related duties as assigned.
- Minimum of 5 years of experience in Information Security, with at least 3 years of in-depth experience with vulnerability management, cloud security, and/or security operations.
- Strong hands-on experience with cloud security (azure preferred), including policy enforcement, identity and access management, and secure configurations.
- Proven track record with vulnerability scanning tools (e.g., Defender, Qualys, Tenable, Vipr) and the ability to drive remediation programs across enterprise environments.
- Hands-on experience with SIEM/SOC operations (Microsoft Sentinel preferred), including detection engineering and event analysis.
- Experience with EDR platforms, including configuration, management, and optimization of endpoint security capabilities.
- Experience with asset management platforms (e.g., Armis, Axonious, Service Now CMDB, or similar) and applying asset intelligence to support security operations.
- Solid understanding of incident response methodologies, threat detection, and cloud-native attack vectors.
- Strong analytical…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).