Match score not available

Operations Security Analyst II

Remote: 
Full Remote
Contract: 
Salary: 
82 - 82K yearly
Experience: 
Mid-level (2-5 years)
Work from: 

Offer summary

Qualifications:

Bachelor’s degree in computer science or related field, Minimum 4 years in cyber security or SOC, Experience with vulnerability management workflows, Knowledge of MITRE ATTACK Framework and Cyber Kill Chain, Certifications like CySA, Security+, or CASP+ preferred.

Key responsabilities:

  • Identify and analyze threats using various resources
  • Support comprehensive vulnerability assessments
  • Monitor and respond to alerts and incidents
  • Report vulnerabilities affecting operations
  • Assist in developing testing criteria for new rules
Credit Acceptance logo
Credit Acceptance Financial Services Large https://www.creditacceptance.com/
1001 - 5000 Employees
See more Credit Acceptance offers

Job description

Credit Acceptance is proud to be an award-winning company with local and national workplace recognition in multiple categories! Our world-class culture is shaped by dedicated Team Members who share a drive to succeed as professionals and together as a company. A great product, amazing people and our stable financial history have made us one of the largest used car finance companies nationally.

Our Engineering and Analytics Team Members utilize the latest technology to develop, monitor, and maintain complex practices that help optimize our success.  Our Team Members value being challenged, are encouraged to express their ideas, and have the flexibility to enjoy work life balance.  We build intrinsic value by partnering with all functions of our business to support their success and make strategic business decisions.  We focus on professional development and continuous improvement while enjoying a casual work environment and Great Place to Work culture!

As a Security Operations Analyst II, you'll work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact. Additionally, you will apply knowledge of attacker techniques to uncover threats by analyzing log data and researching vulnerabilities to report on and build detections. Technical expertise, and the ability to transform raw data into valuable information are essential for success in this role. Additionally, you will aide in redefining the vulnerability management program within the SOC and responding to phishing alerts.

Outcomes and Activities

Information Security

  • This position will work from home; occasional planned travel to an assigned Southfield, Michigan office location may be required.  However, this position is permitted to work at a Southfield, Michigan office location if requested by the team member
  • Identify and analyze threats to the organization, using OSINT, published vulnerabilities, Threat Intelligence and enrichment resources.
  • Build detailed reports for leaders within the organization to understand their threat landscape.
  • Support senior vulnerability analyst in ongoing, comprehensive vulnerability assessments of network cybersecurity risks to enable risk management and mitigation activities.
  • Utilizes vulnerability data sources such as network discovery, network and host vulnerability scanning, penetration testing, operational exercise data, and compliance inspection reports to analyze, assess, compile, and prioritize vulnerabilities.
  • Take point in triaging phishing alerts to identify telemetry for SOC treat hunting.
  • Monitor and respond to alerts raised by various toolsets as part of an ongoing 24/7 Security Operations Center.
  • Report outages or incidents following guidelines and procedures.
  • Detect, analyze, and respond to incidents, coordinate with other stakeholders for containing, eradicating, and recovering from an incident.
  • Support senior analysts in testing threat hunting playbooks.
  • Drive modernization based on business requirements with minimal degree of risk to the company.
  • Assist in developing testing criteria to implement new signatures/rules.
  • Assist in testing SOC playbooks and testing procedures.

Other

  • Perform all other duties as assigned.
  • Attends work as required.
  • “On-call" availability (Some nights, weekends, and holidays)
  • Remains compliant with our policies, processes and legal guidelines.
  • Works primarily remotely with some occasional travel to a Credit Acceptance building.

Competencies: The following items detail how you will be successful in this role.

  • Customer Empathy: Customer Empathy is the ability to understand the perspectives, pain points, and experiences of customers. It involves actively putting oneself in the customer’s shoes, comprehending their needs and challenges, and using that understanding to provide a better, more customer-centric experience.
  • Engineering Excellence: Engineering Excellence is about bringing great craftsmanship and thought leadership to deliver an outstanding product that delights customers and solves for the business. This involves the pursuit and achievement of high standards, best practices, innovation, and superior solutions.
  • One Team: A One Team mindset refers to a collaborative approach across the organization, where individuals work together seamlessly, without boundaries, as a single, cohesive team. Shared goals, open communication and mutual support create a sense of collective purpose. This enables teams to navigate challenges and pursue shared objectives more effectively.
  • Owner’s Mindset: Owner’s Mindset involves adopting a set of behaviors that reflect a sense of responsibility, accountability, strategic thinking, and a proactive approach to managing your domain. As an owner, you understand the business and your domain(s) deeply and solve for the right outcome for the domain(s) and the business.

Requirements:

  • Bachelor’s degree in computer science, Information Systems, Data Science or closely related field of study or equivalent experience
  • Minimum 4 years of experience in cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), operations incident response, network security or Vulnerability assessment activities
  • Experience with vulnerability management workflows.
  • Able to produce formal and informal reports, briefings, and analysis of actual and potential attacks against technologies.
  • Relate vulnerabilities and attacks to their effects on the operations supported by those systems.
  • Experience with Endpoint Detection and Response tools (EDR) and Intrusion Detection System or Intrusion Prevention System (IDS/IPS) monitoring
  • Knowledge of general OS concepts, including Windows, Linux, or Mac
  • Understanding of MITRE ATT&CK Framework and Cyber Kill Chain flow
  • Capable of identifying threats tailored to the landscape.

Preferred:

  • Actively hold one or more of the following certifications.
    • CompTIA: Cybersecurity Analyst (CySA), Security +, CompTIA Advanced Security Practitioner (CASP+)
    • SANS: GIAC Certified Incident Handle (GCIH), Certified Forensic Analyst (GCFA), Cyber Threat Intelligence (GCTI)
    • Certified Threat Intelligence Analyst (CTIA)
    • Certified SOC Analyst (CSA) Or SIEM Related certifications
    • EDR Related certifications
  • Understands Credit Acceptance’s business model, operations and business terminology. 

Knowledge and Skills:

  • Demonstrates pride in work with a high attention to detail and a sense of urgency to reach goals on time
  • Has critical thinking and proactive problem-solving skills
  • Learns and applies new concepts quickly
  • Handles multiple competing priorities effectively and make good use of resources
  • Self-motivated and able to identify implied tasks without constant oversight.
  • Speaks and writes in a clear, concise, organized, and effective manner for the intended audience
  • Understands complex information coming from different sources to evaluate, reconcile conflicts and determine the best possible outcomes.
  • Understands what is being said and the context in which it is being said.  
  • Recognizes areas of risk and escalates through the correct channels in a timely manner.
  • Knowledge of Common Vulnerabilities and Exposures (CVEs), cyber threats, and vulnerability mitigation strategies.
  • Understand what constitutes network risk, cyberattacks, and the relationship between threats and vulnerabilities
  • Knowledge of common security threats and vulnerabilities
  • Understanding creating reports for analysts and leadership to leverage.
  • Understand of the Incident Response process and risk management.
  • Understand Breach methodologies and understanding of advanced attack methodologies, including living off the land; TTPs outlined in MITRE ATT&CK framework

Target Compensation: A competitive base salary + an annual variable cash bonus will range from $82,496 to123,214.

Final compensation within the range is influenced by many factors including role-specific skills, depth and experience level, industry background, relevant education and certifications, and geographic location.

INDENGLP

#zip

#LI-Remote

Benefits

  • Excellent benefits package that includes 401(K) match, adoption assistance, parental leave, tuition reimbursement, comprehensive medical/ dental/vision and many nonstandard benefits that make us a Great Place to Work 

Our Company Values:

To be successful in this role, Team Members need to be:

  • Positive by maintaining resiliency and focusing on solutions
  • Respectful by collaborating and actively listening
  • Insightful by cultivating innovation, accumulating business and role specific knowledge, demonstrating self-awareness and making quality decisions
  • Direct by effectively communicating and conveying courage
  • Earnest by taking accountability, applying feedback and effectively planning and priority setting

Expectations:

  • Remain compliant with our policies processes and legal guidelines
  • All other duties as assigned
  • Attendance as required by department

Advice!

We understand that your career search may look different than others. Our hiring team wants to make sure that this would be a fit not just for us, but for you long term.  If you are actively looking or starting to explore new opportunities, send us your application!

 

P.S.

We have great details around our stats, success, history and more.  We’re proud of our culture and are happy to share why – let’s talk!

Required degrees must have been earned at institutions of Higher Education which are accredited by the Council for Higher Education Accreditation or equivalent.

Credit Acceptance is dedicated to providing a safe and inclusive working environment for all. As part of our Culture of Compliance, we are proud to be an Equal Opportunity Employer and value our culturally diverse workforce. All qualified applicants will receive consideration for employment regardless of the person’s age, race, color, religion, sex, gender, sexual orientation, gender identity, national origin, veteran or disability status, criminal history, or any other legally protected characteristic.

California Residents: Please click here for the California Consumer Privacy Act (CCPA) notice regarding the personal information Credit Acceptance may collect from you.

Play the video below to learn more about our Company culture.

Required profile

Experience

Level of experience: Mid-level (2-5 years)
Industry :
Financial Services
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Problem Solving
  • Communication
  • Time Management
  • Teamwork
  • Critical Thinking
  • Detail Oriented

Security Operations Center (SOC) Analyst Related jobs