Are you a data expert with a focus on enhancing security? Can you solve complex problems creatively while adhering to the most advanced industry standards?
Join Western Union as a Senior Information Security Analyst.
Motivated by our values : purpose driven, globally minded, and trustworthy & respectful
We’re a FinTech that’s using insight from customers and colleagues worldwide to improve financial services for families, small businesses, multinational corporations, and non-profit organizations.
We’re a team of over 8,000 employees serving 200 countries and territories. We believe when money moves, better things happen.
Better requires process, discipline, and simplification
We’ll look to you to work with best-of-the-breed security systems, performing daily analysis and investigations. You will be responsible for monitoring and responding to Insider Threat security events.
You will triage insider threat alerts and events by correlating security events, behavioural data, and other data sources to determine potential indications of malicious or risky insider activity.
You will leverage multiple platforms and technologies, interfacing with the IT organization, HR, privacy, as well as other business stakeholders.
Events will be generated from endpoints, networks, security information and event management (SIEM) systems, threat intelligence platforms, business stakeholders, employees, third parties, and other sources.
You will support Western Union’s Cyber Insider Threat Program’s mission by deterring, detecting, and preventing insider threat actions by employees, contractors, agents, or authorized users to any Western Union Information Resource.
We need you to have at least 3 years of information security monitoring and response or related experience. You will preferably have experience working in a 24x7 operational environment, with operations across the globe.
You will be comfortable presenting analysis results to management and team members in a concise and actionable format.
You are familiar with security control bypass techniques. You have experience working with technologies including Security Information and Event Monitoring (SIEM), threat intelligence platforms, web proxies / filtering, Cloud Access Security Broker (CASB), file integrity monitoring (FIM), and Data Loss Prevention (DLP).
You will have a track record of acting with integrity, taking pride in your work, seeking to excel, seeking opportunities to drive efficiencies, be curious and adaptable.