NorthMark Strategies is a leading investment firm, combining capital, innovation, and engineering to drive long-term value. From operating complex businesses to backing breakthrough technologies, our mission is to build enduring businesses. Our team combines intelligent risk-taking, operational excellence, exceptional talent, and world-class computing capacity to create shareholder value.
Our values are Integrity, Ability, and Energy, and the company aims to hire individuals who possess those qualities.
The IT Security team is responsible for the oversight and execution of a “cloud-first” Cyber Defense, Business Continuity and Risk Management programs to support our business goals. This includes, but is not limited to security operations, vulnerability and patch management, incident response, disaster recovery, business continuity, risk identification and mitigation planning / implementation, identity management, network security, privacy, and compliance.
In the Cyber Defense Security Analyst role, you will be working to help build and maintain security programs at a rapidly growing investment company as well as its associated holdings. You will report to the Manager, Cyber Defense Operations and will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents and executing strategies to detect and deter insider threats. This position will serve as a project member on multiple projects simultaneously and will interact regularly with technical subject matter experts.
The ideal candidate will hold a Bachelor of Science degree in Information/Cyber Security or applicable field and have at least 3+ years of experience in a Security or Technology role. The candidate must possess a strong understanding of the role of Information Security Policies and Standards and a proficient understanding of the Microsoft 365 / Azure platforms/ AWS
Monitor security event logs and alerts generated by various security technologies, including SIEM, IDS/IPS, firewalls, and endpoint protection systems.
Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations.
Identify, analyze, and assess potential insider threats through behavioral analytics, log review, and threat intelligence.
Maintain and improve SOC processes and procedures, staying current with the latest security trends and technologies.
Assist in developing strategies to handle security incidents and coordinate responses to insider threats.
Support the development and implementation of use cases, detection rules, and playbooks.
Continuously review and refine insider risk policies to ensure they are effective and up to date.
Develop and implement automated processes for monitoring and enforcing insider risk policies.
Participation in security root cause analysis and forensics as part of NorthMark Strategies’ Cyber Incident Response Plan.
At least 3 years of experience in a SOC analyst role or similar cybersecurity position.
Bachelors of Science in Information/Cyber Security or a related field (or equivalent work experience)
Proficiency in Microsoft 365 security tools and collaboration technologies.
Proficiency in Cloud Computing Service security (Azure & AWS).
Proficiency in security tools and technologies for monitoring insider threats
Experience threat hunting in Microsoft 365 environments to identify insider risk threats.
Interpersonal and collaborative skills and the ability to communicate security and risk-related concepts to technical and nontechnical audiences.
Innovative, creative, curious, and passionate about Information Security and Technology.
High degree of initiative, dependability, and ability to work with little supervision.