image
  • Snapboard
  • Activity
  • Reports
  • Campaign
Welcome ,
loadingbar
Loading, Please wait..!!

Cyber Security Analyst II

  • ... Posted on: Apr 22, 2026
  • ... Origin Bank
  • ... Ruston, Washington
  • ... Salary: Not Available
  • ... Full-time

Cyber Security Analyst II   

Job Title :

Cyber Security Analyst II

Job Type :

Full-time

Job Location :

Ruston Washington United States

Remote :

No

Jobcon Logo Job Description :

Job Description Origin Bank is seeking an experienced Cyber Security Analyst II to join our Cybersecurity department. This role is critical in safeguarding the bank’s sensitive data, systems, and customer information from cyber threats. The Analyst will primarily focus on vulnerability management program, performing additional cybersecurity tasks as needed including scanning, monitoring, analysis, remediation planning. Secondary duties include monitoring, analyzing, and responding to security incidents, implementing protective measures, and monitoring compliance with industry regulations. This position requires a proactive problem‑solver with solid technical skills and a deep understanding of cybersecurity best practices. Duties and Responsibilities include the following: Vulnerability Monitoring: Conduct regular vulnerability scans using industry‑standard tools (e.g., Nessus, Qualys). Vulnerability Analysis: Monitor scan results, security alerts, system logs, and external threat intelligence feeds to identify potential vulnerabilities. Risk Monitoring: Prioritize vulnerabilities based on risk assessments and business impact, recommending appropriate remediation strategies. Enterprise Security: Monitor security alerts, system logs, and external threat intelligence feeds to identify potential vulnerabilities. Documentation: Maintain up‑to‑date documentation of remediation processes, vulnerability management workflows, accepted risks, and compliance efforts. Reporting: Assist in collecting metrics and preparing vulnerability assessment reports, highlighting key findings, risk levels, and remediation recommendations. Continuous Improvement: Stay current with emerging vulnerabilities, threat trends, and best practices in vulnerability management. Process Improvements: Contribute to the evolution of our vulnerability management framework and security policies to enhance overall protection. Assist in evaluation of new cybersecurity vendors and tools. Remediation Coordination: Collaborate with internal teams to design and implement remediation plans, including patch management and configuration changes. Remediation Monitoring: Track remediation progress and verify the effectiveness of applied fixes through follow‑up scans and tests. Supervisory Responsibilities This job has no supervisory responsibilities. Qualifications To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Education and/or Experience Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field. Experience: 3-5 years of experience in cybersecurity or a related IT role, preferably in a financial services or banking environment. Certifications (Preferred): CISSP, CEH, CompTIA Security+, GSEC, or similar certifications. Technical Skills and Knowledge Familiarity with common operating systems (Windows, Linux, Unix) and networking protocols (TCP/IP, HTTP, DNS, TLS). Experience with security technologies such as firewalls, SIEM platforms, endpoint protection, encryption, and vulnerability management tools. Hands‑on experience with security monitoring tools. Ability to read code and make security decisions from content. Must have strong computer proficiency and understand how to use basic office applications, including MS Office (Word, Excel, and Outlook). Soft Skills Strong analytical and problem‑solving skills with a keen attention to detail and ability to work under pressure. Ability to work both independently and as part of a collaborative team in a fast‑paced environment. Ability to work on larger projects as well as balance day to day requirements. Strong writing/documentation skills necessary. Regular and predictable attendance. Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws. Know Your Rights #J-18808-Ljbffr

View Full Description

Jobcon Logo Position Details

Posted:

Apr 22, 2026

Reference Number:

14660_4980EE9A9DB8ECD79430B8117467C2DD

Employment:

Full-time

Salary:

Not Available

City:

Ruston

Job Origin:

APPCAST_CPC

Share this job:

  • linkedin

Jobcon Logo
A job sourcing event
In Dallas Fort Worth
Aug 19, 2017 9am-6pm
All job seekers welcome!

Cyber Security Analyst II    Apply

Click on the below icons to share this job to Linkedin, Twitter!

Job Description Origin Bank is seeking an experienced Cyber Security Analyst II to join our Cybersecurity department. This role is critical in safeguarding the bank’s sensitive data, systems, and customer information from cyber threats. The Analyst will primarily focus on vulnerability management program, performing additional cybersecurity tasks as needed including scanning, monitoring, analysis, remediation planning. Secondary duties include monitoring, analyzing, and responding to security incidents, implementing protective measures, and monitoring compliance with industry regulations. This position requires a proactive problem‑solver with solid technical skills and a deep understanding of cybersecurity best practices. Duties and Responsibilities include the following: Vulnerability Monitoring: Conduct regular vulnerability scans using industry‑standard tools (e.g., Nessus, Qualys). Vulnerability Analysis: Monitor scan results, security alerts, system logs, and external threat intelligence feeds to identify potential vulnerabilities. Risk Monitoring: Prioritize vulnerabilities based on risk assessments and business impact, recommending appropriate remediation strategies. Enterprise Security: Monitor security alerts, system logs, and external threat intelligence feeds to identify potential vulnerabilities. Documentation: Maintain up‑to‑date documentation of remediation processes, vulnerability management workflows, accepted risks, and compliance efforts. Reporting: Assist in collecting metrics and preparing vulnerability assessment reports, highlighting key findings, risk levels, and remediation recommendations. Continuous Improvement: Stay current with emerging vulnerabilities, threat trends, and best practices in vulnerability management. Process Improvements: Contribute to the evolution of our vulnerability management framework and security policies to enhance overall protection. Assist in evaluation of new cybersecurity vendors and tools. Remediation Coordination: Collaborate with internal teams to design and implement remediation plans, including patch management and configuration changes. Remediation Monitoring: Track remediation progress and verify the effectiveness of applied fixes through follow‑up scans and tests. Supervisory Responsibilities This job has no supervisory responsibilities. Qualifications To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Education and/or Experience Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field. Experience: 3-5 years of experience in cybersecurity or a related IT role, preferably in a financial services or banking environment. Certifications (Preferred): CISSP, CEH, CompTIA Security+, GSEC, or similar certifications. Technical Skills and Knowledge Familiarity with common operating systems (Windows, Linux, Unix) and networking protocols (TCP/IP, HTTP, DNS, TLS). Experience with security technologies such as firewalls, SIEM platforms, endpoint protection, encryption, and vulnerability management tools. Hands‑on experience with security monitoring tools. Ability to read code and make security decisions from content. Must have strong computer proficiency and understand how to use basic office applications, including MS Office (Word, Excel, and Outlook). Soft Skills Strong analytical and problem‑solving skills with a keen attention to detail and ability to work under pressure. Ability to work both independently and as part of a collaborative team in a fast‑paced environment. Ability to work on larger projects as well as balance day to day requirements. Strong writing/documentation skills necessary. Regular and predictable attendance. Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws. Know Your Rights #J-18808-Ljbffr

Loading
Please wait..!!