SonicJobs Logo
Left arrow iconBack to search

Information Security Analyst

MassMutual
Posted 5 hours ago, valid for a year
Location

Hartford, CT 06151, US

Salary

$80,000 - $96,000 per annum

info
Contract type

Full Time

Sonic Summary

info
  • The Information Security Analyst position at MassMutual in Springfield offers a full-time opportunity within a Security Operations Center (SOC) team focused on cybersecurity.
  • Candidates are required to have at least 1 year of cybersecurity work experience and a minimum of 6 months of prior internship or externship experience in related projects.
  • An Associate's Degree in Cyber Security or a related field is necessary for applicants, who must also be able to work a 4x10 shift schedule from Wednesday to Saturday.
  • The role involves monitoring cybersecurity technologies, performing malware analysis, and collaborating with various teams to enhance threat detection and prevention capabilities.
  • While the salary is not explicitly stated, the position is noted to offer industry-leading pay and benefits, reflecting the company's commitment to ethical business practices.

JOB DESCRIPTION

Information Security Analyst - Core

Full-Time, Springfield

The Opportunity

As a Security Operations Center (SOC) analyst you’ll have an opportunity to part of a growing team of highly technical Cybersecurity analysts who are passionate about protecting MassMutual’s assets and customers by leveraging problem solving skills and innovative technology solutions. In this role, as well as all roles within MassMutual, you will demonstrate accountability, agility, a dedication to be inclusive, a strong business acumen, and will show courage, even in the most difficult situations. We also highly value strong communication skills, a passion for learning, leadership traits, resilience, and self-awareness.

The Team

Our team is comprised of a diverse group of highly technical individuals from across the globe helping us to achieve a 24x7x365 follow the sun support model

The Impact:

  • Perform monitoring for cybersecurity related technologies generating alerts for potential security events requiring investigation.
  • Perform Malware analysis and extract Indicators of Compromise (IOCs) to feed our Threat Intelligence Platform
  • Identify, classify, and document adversary Tactics, Techniques and Procedures (TTPs)
  • Work collaboratively with our Security Intelligence team to enrich and enhance prevention, detection, and threat hunting capabilities.
  • Partner with our Security Platforms team to develop playbooks required to successfully respond to specific threats
  • Work with the Detection Engineering team to optimize alerting platforms through tuning of alerting logic.

The Minimum Qualifications

  • Associates Degree in Cyber Security or related field
  • 6+ months of prior internship or externship experience working on cyber security projects or programs
  • Ability to work 4x10 shift schedule Wednesday - Saturday 1pm - 11 pm ET.
  • 1+ year cybersecurity work experience

The Ideal Qualifications

  • Certifications: CISSP, CISM, CISA, GCIH, GIAC
  • Knowledge of and practical experience with the MITRE ATT&CK framework
  • Experience with Python, PowerShell or other scripting languages
  • Experience leveraging OSINT resources to perform investigations
  • Functional knowledge of how operating systems (Windows, Mac, Linux).
  • Proven Ability to mine large data sets leveraging SIEM platforms
  • High level knowledge of Cybersecurity attack and defense techniques
  • Understanding of living off the land techniques used by adversaries, using tools such as PowerShell, WMIC, Task Scheduler, Windows Registry etc.
  • Understanding of web application vulnerabilities including XSS, CSRF, SQL Injection, command injection and serialization attacks
  • Strong understand of web authentication flows such as SAML and OAUTH
  • Working knowledge of email security tools and leveraging email security tools to identify, scope and remediate malicious email
  • Functional knowledge of cloud environments like AWS and Azure
  • Understanding of automated attacks such as credential stuffing and site scraping
  • Interest in continuous learning and a passion for Cybersecurity
  • Ability to apply problem solving skills to support analysis and detection efforts
  • Experience and confidence with communicating with and presenting to senior leadership
  • Strong written and verbal communication skills
  • Strong analytical and problem-solving skills

What to Expect as Part of MassMutual and the Team

  • Regular meetings with the Director of the US Security Operations Centers
  • Focused one-on-one meetings with your manager
  • Access to mentorship opportunities
  • Networking opportunities including access to Asian, Hispanic/Latinx, African American, women, LGBTQIA+, veteran and disability-focused Business Resource Groups
  • Access to learning content on Degreed and other informational platforms
  • Your ethics and integrity will be valued by a company with a strong and stable ethical business with industry leading pay and benefits
MassMutual is an Equal Employment Opportunity employer Minority/Female/Sexual Orientation/Gender Identity/Individual with Disability/Protected Veteran. We welcome all persons to apply. Note: Veterans are welcome to apply, regardless of their discharge status.

If you need an accommodation to complete the application process, please contact us and share the specifics of the assistance you need.

Apply now in a few quick clicks