Citizens

As one of the oldest and largest financial services firms in the United States with a history dating back to 1828, we’re committed to providing solutions and expertise that support our customers, clients, colleagues, and communities in what’s next on their own unique journey. We invest in the humans who build the logic, ideas, and innovations that bring new technologies to life. Investments in AI, cloud computing, machine learning and automation provide our engineers the tools that enable us to remain competitive and win in today’s environment. At Citizens, we recognize that the journey to accomplishment is no longer linear and that individuals are made of all they have done and all they are going to do. Whether you’re considering banking with us or looking to work with us, you’ll find a customer-centric culture and a supportive, collaborative workforce at Citizens. You’re made ready and so are we. If you're ready to advance your career in technology and security, learn more about opportunity's Citizens offers here: https://jobs.citizensbank.com/digital-transformation

Sr Cyber Defense Ops Spec

Chief Marketing OfficerChief Marketing OfficerFull TimeRemoteTeam 17,000Since 1828Company Site

Location

Rhode Island

Posted

22 days ago

Salary

Not specified

Bachelor Degree9 yrs expEnglishPythonPowershellBashSplunkSentinelQradarArcsightCrowdstrikeMicrosoft DefenderSentinelonePalo AltoCiscoCheck PointFirepowerSymantec DlpTritonGuardiumMitre Att&ckSIEMEdrXdrSoarAWSAzureGCP

Job Description

We are seeking a skilled and proactive Level 2 Cybersecurity Analyst to join our Cyber Defense Operations team. This role is responsible for investigating and responding to security incidents, performing advanced threat analysis, and supporting the continuous improvement of detection and response capabilities. You’ll work closely with junior analysts, threat intelligence, and incident response teams to ensure timely detection and mitigation of security threats across Citizens Bank’s enterprise environment. Key Responsibilities Investigate escalated security alerts and incidents from Level 1 analysts. Perform root cause analysis and impact assessments of security events. Conduct threat hunting and anomaly detection across enterprise systems. Collaborate with incident response teams to contain and remediate threats. Correlate threat intelligence with internal telemetry to identify emerging threats and attack patterns. Assist in the creation of use cases and offer recommendations for tuning detection rules in SIEM and other monitoring tools. Recommend improvements to incident response playbooks and runbooks. Provide mentorship and guidance to Level 1 analysts. Participate in post-incident reviews and contribute to lessons learned. Represent Cyber Defense in cross-functional security and risk initiatives. Required Knowledge Areas Deep understanding of network and endpoint security concepts. Knowledge of threat actor tactics, techniques, and procedures (TTPs). Familiarity with the MITRE ATT&CK framework and threat intelligence platforms. Knowledge of regulatory and compliance frameworks (e.g., NIST, ISO, PCI-DSS). Required Skills Proficient in log analysis, packet capture review, and malware analysis. Strong analytical and problem-solving skills. Experience with scripting or automation (Python, PowerShell, Bash). Effective oral and written communication skills for both technical and non-technical audiences. Ability to work independently and collaboratively in a high-pressure environment. Qualifications

Job Requirements

  • Bachelor’s degree in Cybersecurity, Computer Science, or a related field, or equivalent experience.
  • 2–5 years of experience in cybersecurity operations or incident response.
  • Security certifications such as CySA+, GCIH, GCIA, CEH, or equivalent preferred.
  • Experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar) and EDR tools (e.g., CrowdStrike, Microsoft Defender).
  • Willingness to participate in a rotating on-call schedule or extended hours during critical incidents.
  • Preferred Experience
  • Hands-on experience with:
  • SIEM Tools: Splunk, ArcSight, Sentinel, QRadar
  • EDR/XDR: CrowdStrike, Microsoft Defender, SentinelOne
  • Network Security: Palo Alto, Cisco, Check Point, FirePower
  • Data Protection: Symantec DLP, Triton, Guardium
  • Threat Intelligence & SOAR Platforms
  • Cloud Security Monitoring: AWS, Azure, or GCP environments
  • Hours Work and Schedule
  • Hours per Week: 7am - 5pm
  • Work Schedule: Monday - Thursday

Related Categories

Related Job Pages

More Chief Marketing Officer Jobs

Staff Ecosystem Analyst

Block

Block builds simple, powerful tools that make progress towards an economy that’s truly open to all.

Chief Marketing Officer22 days ago
Full TimeRemoteTeam 10,001+Since 1990H1B Sponsor

The Staff Ecosystem Analyst will lead strategic data initiatives, synthesize insights, collaborate with various teams, and innovate using AI to influence business decisions and strategies within Block's ecosystem.

LlmsPythonRSnowflakeSQLTableau
California
Chief Marketing Officer22 days ago
Full TimeRemoteTeam 1,001-5,000H1B Sponsor

Chief Marketing Officer developing measurable revenue engine for IDC

United States
$100K - $120K / year

Head of Marketing

Sword Health

Sword Health is the world’s fastest growing virtual MSK care provider, on a mission to free two billion people from pain

Chief Marketing Officer22 days ago
Full TimeRemoteTeam 201-500Since 2015H1B No Sponsor

Open this job to view full details and requirements.

United States
$192.0K - $301.9K / year

Head of Marketing

Checkmate

An agentic AI marketing platform that connects brands to shoppers like never before.

Chief Marketing Officer22 days ago
Full TimeRemoteTeam 11-50Since 2022

The Problem We’re Solving 🎯Most DTC brands are leaving revenue on the table. They spend millions acquiring customers through paid channels, then lose 60%+ of high-intent shoppers to cart abandonment, anonymous browsing, and missed retargeting opportuni...

United States