Building a World-Class, Diverse and Inclusive Technology Team at TD
We can't afford to be boring. Neither can you. The scale and scope of what TD does may surprise you. The rapid pace of change makes it a business imperative for us to be smart and open-minded in the way we think about technology. TD's technology and business teams become more intertwined as new opportunities present themselves. This new era in banking does not equal boring. Not at TD, anyway.
Enterprise Protect CTM (Cyber Threat Management) team is a group of technology, security and risk professionals in North America and Singapore, focused on managing a comprehensive program to assess, prioritize, and mitigate business risk with technology controls.
The Cyber Security Team is responsible for protecting the Bank, customers, and employees by mitigating and identifying technology threats to TD. Development of effective risk management programs help ensure TD's best-in-class cyber security approach.
What We Stand For
The Enterprise Protect program is continuously evolving to mitigate risks to the bank, including introducing new initiatives and improved defense. With a layered approach to protect customers, employees and the bank from cyber threats, TD manages, challenges and reviews technology controls for all business applications.
The Senior Information Security Analyst is responsible for leading the team of Information Security Analysts in tier 1 and tier 2 triage investigations and incident handling for cybersecurity operations.
- Lead and coordinate Real-time analysis on identified cyber incidents currently impacting the bank's operations.
- Analyze, triage, and remediate security incidents internally and/or escalate to Cyber Security Incident Response team (CSIRT) for further investigation, treatment or support if needed.
- Manage incident queue in internal ticketing system in a timely and accurate manner to resolve a multitude of information security related situations and ensure that intake of incidents and reports from internal customers are properly recorded, timely updated, followed up and closed as per agreed SLA level ensuring quality and accurately in reporting.
- Manage and support phishing operations through ticketing system in a timely and accurate manner to mitigate any phishing campaign targeting our internal employees.
- Manage executive communications who are directly impacted or targeted as part of a phishing campaign.
- The ability to guide team to identify, triage and remediate security incidents related to Web Attacks, Malware incidents, and other external and internal threats is required.
- The personnel in this role will occasionally be required to participate in shift rotations and office hours to support as part of a cyber security operations team responsible for carrying out 24x7 on-site security monitoring operations. Operations which are carried out in Singapore shifts that run from 7am-3pm, 12pm-8pm or 7am-7pm on a rotating basis.
- The personnel will be assigned to be on-call rotationally on a weekly basis to support and coordinate with the team for any notable events during after office hours and weekend (APAC Hours).
Job Requirements
Knowledge and Skills:
- 5 - 7 years of experience in Information Security Operations or related field is required.
- A minimum of 3 years experience of leading and coordinating the Security Operations Monitoring team
- A thorough understanding of security controls and mechanisms, as well as threat risk assessment techniques related to complex data, applications, and networking environment.
- Must have expert knowledge of security incident and event management using an enterprise incident management framework, log analysis, network traffic analysis, malware investigation and remediation, SIEM correlation logic and alert generation.
- Ability to perform analysis and reporting on information from multiple data sources using data mining technique for the purpose of documenting analysis results, produce report and present to a technical and executive stakeholder.
- Must have expert knowledge in SIEM, EDR, XDR, Firewall, WAF, NIDS and equivalent.
- Understanding of Security principles, techniques, and technologies such as NIST Cybersecurity Framework, SANS Top 20 Critical Security Controls and OWASP Top 10.
- Strong organizational and self-directing skills. Ability to initiate, coordinate and prioritize responsibilities and follow through on tasks to completion.
- Must demonstrate expert knowledge in Enterprise IT operations, incident management, change management, Access/Identity Management, security operations, vulnerability and compliance management, ticketing system, incident ticket life cycle and SLA terms.
- Must have excellent written and oral communication skills.
- Ability to work independently on a variety of assignments with minimal supervision.
- Ability to work without supervision with the senior leadership team.
- Good to have basic programming skills in various disciplines including scripting languages.
Background and Education:
- Completion of a Bachelor's degree or equivalent program in Computer Science, Management Information Systems or similar field is required.
- Completion of at least one of the following: GIAC (GSEC, GCIH, GCIA, GCFE, GCFA), CCNP, CCNA, CISSP