CrawlJobs Logo

Cyber Defense Analyst

https://www.citi.com/ Logo

Citi

Location Icon

Location:
Mexico , Ciudad De Mexico

Category Icon

Job Type Icon

Contract Type:
Employment contract

Salary Icon

Salary:

Not provided

Job Description:

The cyber defense analyst for Services within the Business, Functions and Technology (BFT) is responsible for maintaining a secure technology ecosystem free from high-risk vulnerabilities and rapidly responding to the changing threat landscape and business demand to mitigate cyber risk for the Services business.

Job Responsibility:

  • Ensure business and technology remain within risk tolerance for all applicable Cybersecurity risk appetites and sustain it with the consistent operating model
  • Enhance current vulnerability management (VTM) operating model in line with BFT Risk Governance organization with Path-to-appetite and reporting
  • Timely escalate to CISO Leadership and Businesses and ensure VTM risk treatment responses are entered in a timely fashion
  • Support Vulnerability Organization to improve the quality and integrity of VTM/GEM reports
  • Continue supporting vulnerability management Uplift Program activities and reduce risk while reducing stakeholders’ pain-points (data/reporting, false positives, processes)
  • Perform root cause analysis of VA Issues and identification of repeated offenders for high risk vulnerabilities
  • Conduct security reviews to check for security compliance to Bank’s requirements
  • Identify areas of repeating SIRT incidents, related trending and work with technology team and ISO contacts in reducing repeat volume instances
  • Identify opportunities for improving SIRT workflow efficiencies and developing reporting which better reports on root causes for bringing down repeat instance volumes
  • Work with SIM and ISO community to facilitate the adherence of SIRT reporting timelines as per defined within SIRT standard, as well as identify deviations and its cause
  • Define and document escalation and response procedures between IR CFSC and Cyber Defense
  • Document/update a Cyber Response plan or guideline to complement Business or Country Crisis Management Plans and support Crisis Management Team training.

Requirements:

  • Ensure business and technology remain within risk tolerance for all applicable Cybersecurity risk appetites and sustain it with the consistent operating model
  • Enhance current vulnerability management (VTM) operating model in line with BFT Risk Governance organization with Path-to-appetite and reporting
  • Timely escalate to CISO Leadership and Businesses and ensure VTM risk treatment responses are entered in a timely fashion
  • Support Vulnerability Organization to improve the quality and integrity of VTM/GEM reports
  • Continue supporting vulnerability management Uplift Program activities and reduce risk while reducing stakeholders’ pain-points (data/reporting, false positives, processes)
  • Perform root cause analysis of VA Issues and identification of repeated offenders for high risk vulnerabilities
  • Conduct security reviews to check for security compliance to Bank’s requirements
  • Identify areas of repeating SIRT incidents, related trending and work with technology team and ISO contacts in reducing repeat volume instances
  • Identify opportunities for improving SIRT workflow efficiencies and developing reporting which better reports on root causes for bringing down repeat instance volumes
  • Work with SIM and ISO community to facilitate the adherence of SIRT reporting timelines as per defined within SIRT standard, as well as identify deviations and its cause
  • Define and document escalation and response procedures between IR CFSC and Cyber Defense
  • Document/update a Cyber Response plan or guideline to complement Business or Country Crisis Management Plans and support Crisis Management Team training.

Additional Information:

Job Posted:
November 19, 2025

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Defense Analyst

Advanced Cyber Defense Analyst

The Advanced Cyber Defense (ACD) team is a group inside the Citi Security Operat...
Location
Location
Hungary , Budapest
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4-6 years working in the security & operations fields
  • Possessing strong fundamental knowledge of networks (TCP/IP) and operating systems (Windows/Linux)
  • Hands-on experience with cyber security solutions
  • SIEM, AV, NIDS, EDR etc.
  • Ability to investigate network traffic, read and interpret logs and packet captures, investigate email threats
  • Experience with cyber security incident response, web/shell programming as well as being familiar with malware and memory analysis techniques are advantageous
  • Fluency in English
  • Bachelor's Degree or higher preferred
Job Responsibility
Job Responsibility
  • Conduct research on new technology offerings and determine applicability in Citibank’s SOC
  • Evaluate and advise on the implementation and effectiveness of the cybersecurity safeguards to ensure that they provide the intended level of protection
  • Development of new tools, processes and procedures to enhance SOC monitoring and analysis capabilities
  • Perform risk assessments and threat modelling to identify gaps in SOC monitoring capabilities and devise strategies to minimize the risk
  • Conduct online research of the latest cyber threats and ensure those can be detected by existing in-house technologies
  • Identify redundant tasks and automate them to increase efficiency of the SOC team
  • Utilize SOAR to develop playbooks for automating complex use cases
What we offer
What we offer
  • Cafeteria Program
  • Home Office Allowance (for colleagues working in hybrid work models)
  • Paid Parental Leave Program (maternity and paternity leave)
  • Private Medical Care Program and onsite medical rooms at our offices
  • Pension Plan Contribution to voluntary pension fund
  • Group Life Insurance
  • Employee Assistance Program
  • Access to a wide variety of learning and development programs, online course libraries and upskilling platforms, such as Udemy and Degreed
  • Flexible work arrangements to support you in managing work - life balance
  • Career progression opportunities across geographies and business lines
  • Fulltime
Read More
Arrow Right

Computer Network Defense Analyst

Altamira is searching for a Computer Network Defense Analyst in Annapolis Juncti...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Experience in network or system administration
  • Completion of military training in a relevant area such as JCAC, UCT, NWBC/INWT, Cyber Defense Operations can count towards experience
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Clearance: TS/SCI w/Full Scope Poly
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • $20K SIGN-ON BONUS AFTER SIX-MONTHS ON CONTRACT
Read More
Arrow Right

Computer Network Defense Analyst

Altamira is searching for a Computer Network Defense Analyst. Use information co...
Location
Location
United States , Harlem, GA; Annapolis Junction, MD
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Experience in network or system administration
  • Completion of military training in a relevant area (e.g., JCAC, UCT, NWBC/INWT, Cyber Defense Operations) may count toward experience
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Clearance: TS/SCI w/Full Scope Poly
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • $20K sign-on bonus after six-months on contract
Read More
Arrow Right

Computer Network Defense Analyst

Hoplite Solutions is seeking experienced Computer Network Defense Analysts (CNDA...
Location
Location
United States
Salary
Salary:
Not provided
hoplitesolutions.com Logo
Hoplite Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI with polygraph clearance
  • STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field (extended military cyber training courses may be counted toward degree requirement)
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Demonstrative experience w/SIGINT and AMOD
  • Experience in network or system administration
  • Documented foreign language proficiency may count toward experience requirements
  • Specific labor category determined by years of experience + educational degrees and/or equivalencies
Job Responsibility
Job Responsibility
  • Use information collected from a variety sources to identify potential vulnerabilities, respond to cyber events, and defend against events that might occur
  • Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems
  • Support a wide range of data transport possibilities
  • Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
What we offer
What we offer
  • Paid holidays and vacation
  • Fully covered healthcare
  • Short- and long-term disability
  • Up to 7% 401(k) matching
  • Referral bonuses
  • Tuition reimbursement
  • Fulltime
Read More
Arrow Right

Principal Cyber Operations Analyst Trainer

Knight Federal Solutions Inc. is seeking a Principal Cyber Operations Analyst Tr...
Location
Location
United States , Suffolk
Salary
Salary:
Not provided
knightfederal.com Logo
Knight Federal Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree with a minimum of 10 years of professional and/or military operational experience
  • or specialized technical training and certifications directly related to the requirement
  • Master’s degree with a minimum of 6 years of professional and/or military operational experience
  • or specialized technical training and certifications directly related to the requirement
  • Joint Forces Staff College or Service equivalent
  • Thorough understanding of cyber operations and experience at the operational level
  • Must be willing to travel worldwide, to include areas considered hazardous duty (up to 25% of the time)
  • Must have an active U.S. Department of Defense (DoD) Secret security clearance with the ability to obtain a DoD Top Secret security clearance once aboard
  • Must be able to work on-site in Suffolk, Virginia
Job Responsibility
Job Responsibility
  • Acts as a subject matter expert and trainer in cyber operations in joint, multinational, interagency, and globally integrated exercises and operations
  • Integrates into, contributes to, and provides functional continuity in the DTD’s Fires and Effects Section
  • Mentors, trains, and supports new OTs
  • Participates as a member of Deployable Training Teams (DTTs)
  • Ascertains key command challenges at the operational and strategic levels of war and conducts cross-functional analysis of information gathered from joint exercises and training events for the development of lessons learned, insights, and best practices
  • Understands strategic thought and direction as it guides and is influenced by campaign, deliberate, and crisis planning at the operational level
  • Researches national strategic documents, historical exercise documents, real world operations, the operating environment, command mission, organization, plans, and orders, as well as interagency and coalition policies, strategies, and plans
  • Conducts trend analysis, understands and improves battle rhythms, provides observation and training, ties phased operational planning to strategic thought, and develops feedback
  • Develops the Commander’s Facilitated After-Action Review (FAAR), Executive Summary Report (ESR), Combined Functional Report (CFR), and Internal After Action Review (IAAR), Post-event debriefs and summaries, and input into the Joint Lessons Learned Information System (JLLIS)
  • Updates and maintains documents, articles, and periodicals
Read More
Arrow Right

Cyber Information Assurance Analyst - Junior Assessor

The Cyber Information Assurance Analyst supports the customer by performing anal...
Location
Location
United States , Ft. Meade, MD
Salary
Salary:
65000.00 - 70000.00 USD / Year
chickasaw.com Logo
Chickasaw Nation Industries, Inc (CNI)
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • The ability to obtain, maintain and access classified information at the TS/SCI level
  • DoD 8570 IAM/IA Technical (IAT) Level II certification
  • Familiarity with STIGs (Security Technical Implementation Guides), Security Requirement Guides (SRGs), Plan of Action and Milestones (POA&Ms) and cybersecurity best practices
  • Understanding of the RMF process, NIST SP 800- 37, NIST SP 800-53, CNSSI 1253
  • Familiarity with relevant tools such as eMASS, STIG Viewer, Nessus, ACAS, SCAP, or HBSS
  • Strong written and verbal communication skills for reporting assessment findings
  • This position requires travel ~85% CONUS & OCONUS
  • Bachelor's Degree and a minimum of one to two (1-2) years of experience in systems security, or equivalent combination of education/experience
Job Responsibility
Job Responsibility
  • Conducts cybersecurity assessments, audits, and inspections for DoD organizations and partners handling DoD information or connecting to the DoDIN
  • Evaluates systems and Defensive Cyberspace Operations using cyber threat emulation and performance-based testing
  • Adheres to policies and processes for each assessment type
  • Supports assessment development and execution to ensure security expertise is properly applied
  • Coordinates logistics, test plans, and scope with the SCA Team Lead
  • Performs vulnerability assessments, capture results using STIG Viewer or designated tools, and document findings in eMASS
  • Analyzes security gaps and provide mitigation recommendations
  • Validates cybersecurity controls, TTPs, STIGs, RMF controls, and compliance with DoD policies and guidelines
  • Provides risk analysis and assessment results for authorization recommendations
  • Participates in daily assessment reviews, in-briefs, and out-briefs, sharing findings with the SCA-R
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • 401(k)
  • Family Planning/Fertility Assistance
  • STD/LTD/Basic Life/AD&D
  • Legal-Aid Program
  • Employee Assistance Program (EAP)
  • Paid Time Off (PTO) – (11) Federal Holidays
  • Training and Development Opportunities
  • Fulltime
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees: Level 1: 2 years applicable experience with a bachelors degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a masters degree, OR 5 years applicable experience with a bachelors degree, OR 7 years applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI with polygraph
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Level 1: 2 years applicable experience with a bachelors degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a masters degree, OR 5 years applicable experience with a bachelors degree, OR 7 years applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right