Description The Lead Cyber Defense Analyst is an integral leadership role within our Cyber Defense Monitoring (CDM) team, entrusted with overseeing the technical and operational aspects of our cybersecurity triage processes. The ideal candidate will bring a balance of deep technical expertise, industry experience, and dynamic leadership abilities. As the primary escalation point for technical issues, the Lead Analyst will guide the team in analyzing, triaging, and escalating cybersecurity incidents to our Cyber Defense Incident Response team. The position also entails significant managerial responsibilities, including leading the CDM team's strategic direction and performance. With a focus on our strategic migration from on-premises to Google Cloud, candidates should have substantial experience with cloud technologies and solutions. Primary Responsibilities:
• Supervise the monitoring and triage of security events via the Security Information and Event Management (SIEM) system, ensuring accurate escalation to the Incident Response team. • Guide and mentor the team in the assessment and triage of security incidents. • Develop, document, and implement triage processes. • Collaborate with other Cyber Defense teams to promote proactive detection measures and threat hunting engagements. • Represent the CDM team in meetings and projects requiring deep expertise in Cyber Defense. • Coordinate technical projects and manage team performance goals and targets. • Act as the primary escalation point for Cyber Security Events from the CDM team. • Drive the transition to Google Cloud, implementing cloud-based cyber defense strategies using tools such as Google Chronicle. Personal Attributes:
• Exceptional customer-service orientation. • Superior analytical and problem-solving skills. • High-level critical thinking and decision-making abilities. • Excellent written and oral communication skills. • Strong listening and interpersonal skills. • Ability to articulate complex technical concepts in a user-friendly language. • Proficient in conducting extensive research into network/security issues and products. • Adaptable to a fast-paced, dynamic environment with multiple objectives. • Highly self-motivated, detail-oriented, and capable of leading and inspiring a team. • Proficient in prioritizing and executing tasks in high-pressure situations. • Demonstrated ability to foster a collaborative, team-oriented environment. • Skilled in liaising effectively across all organizational levels. • Professional Experience: • 5+ years of experience in Information Security, with a demonstrated passion for the field. • Proven leadership in technical teams and experience managing complex projects. • Experience in managing security operations in a cloud environment, preferably Google Cloud. • Demonstrated proficiency in incident triage and coordination with incident response teams.
Formal Education & Certifications:
• Degree in Engineering, Computer Science, Information Security, Information System or related work experience. • Relevant certifications such as GCIH, GCFE, GMON, GCFA, GNFA, or similar credentials. • Cloud security certifications like Google Professional Cloud Security Engineer or equivalent are highly desirable. • Proficient with Python, Rust, Java, or related language. • Proven experience in leading teams, managing complex technical projects, and implementing cloud security initiatives. • Experience in developing and executing incident triage processes in a cloud environment
#LI-hybrid #LI-JSA #Dice
CME Group: Where Futures Are Made
CME Group (www.cmegroup.com) is the world's leading derivatives marketplace. But who we are goes deeper than that. Here, you can impact markets worldwide. Transform industries. And build a career shaping tomorrow. We invest in your success and you own it, all while working alongside a team of leading experts who inspire you in ways big and small. Problem solvers, difference makers, trailblazers. Those are our people. And we're looking for more.