Moody's Information Risk team is looking for a Cybersecurity Senior Engineer to join its growing organization. The Cybersecurity Senior Engineer will be responsible for working with Moody's Cybersecurity's SIEM platform based on Splunk and owning the health, accuracy and maintenance of the application on a go forward basis. This individual will lead a team of engineers responsible for the availability of Splunk and architecting upgrades and proactively seeking out improvements to the application while working with operations and support teams to implement these upgrades and enhancements. This role will also involve designing Splunk queries that assist the cybersecurity department in identifying potentially malicious activity and assisting other teams at Moody's to make better data driven decisions using Splunk. This role will also involve the development of dashboards and reports in Splunk to assist with compliance to regulation and identifying security control failures. The individual will also be expected to work closely with the operations team to onboard new security related data sources.
This position requires an advanced technical background in Splunk administration, architecture and Splunk search and app development. The individual must have an understanding of Information Security practice, and solid communication and organization skills. The successful candidate is very motivated and willing to take on challenges, able to multi-task to succeed and has the ability work independently and with minimal oversight.
The Moody's Information Security team is responsible for helping the organization balance risk by aligning policies and procedures with Moody's business requirements. The team is responsible for the development, enforcement and monitoring of security controls, policies and procedures, and for the delivery of security services. The Information Security team sets strategic direction for security within the organization and aligns with stakeholders throughout the company.
Lead a team of Splunk engineers to own the health and accuracy of Splunk system, identifying configuration errors and undertaking remediation activities.
Maintain responsibility for the availability of the Splunk environment and provide clear guidance and direction to the Splunk engineering team to address problems with the environment.
Maintain and build on a comprehensive set of SOPs related to Splunk application administration.
Identify enhancements and architect upgrades to the application.
Provide data onboarding and cleansing services in Splunk for the Moody's organization.
Work with other Cybersecurity teams such as Incident Response.
Construct advanced reports, dashboards and alerts using Splunk and operationalize these capabilities with documentation.
Correlate disparate data sets together in Splunk for the purpose of the Cybersecurity team.
Ability to exercise sound technical, interpersonal and organizational judgment while evaluating and solving complex problems.
Partner with system owners to identify upcoming end of life components, and plan track their decommissioning.
Minimum education and work experience required for this position include:
At least 5 years of experience in IT industry, preferably in a financial services organization.
Minimum of 3 recent years direct Splunk architect and administration experience.
Expert knowledge of Splunk architecture planning, administration, search language (SPL), search techniques, alerts, dashboards and report building.
Expert knowledge of regular expressions and at least one common scripting language (PERL, Python, VB Script).
BS or BA degree, preferably in Computer Science, other sciences.
Relevant certifications such as CISSP are a plus.
Proficiency in a second language is a plus, especially Mandarin, Korean, Japanese or Russian.
Strong knowledge of regulatory standards that govern Information Security Incident Response and Investigation practices such as state and federal privacy laws, Electronic Communications Privacy Act.
Hands-on experience using Splunk platform. Expert level of familiarity with Splunk search languages, including mathematical and statistical functions.
Hands-on experience managing Splunk platform. Strong familiarity with Splunk architecture, implementation, management and maintenance.
Hands on experience working as part of a SEIM engineering team (ideally Splunk).
Reasonable understanding of Indicators of Compromise and other methodologies to detect incident-related anomalies.
Must understand and be familiar with modeling security related data concepts, such as net flow, Web browsing, authentication, email flow, etc.
Good written and oral communication skills including the ability to interact directly with customers that do not have an IT background.
Proven ability to work within a large enterprise that spans multiple continents, is governed by change management and has a tiered support model.
Reporting and dashboards - must be able to create reports and dashboards that represent significant data findings to both technical and executive audiences.
Ability to work in a time-sensitive environment; must be detail oriented and able to multitask to meet deadlines and company objectives.
Moody's is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, sexual orientation, gender expression, gender identity or any other characteristic protected by law.
Candidates for Moody's Corporation may be asked to disclose securities holdings pursuant to Moody's Policy for Securities Trading and the requirements of the position. Employment is contingent upon compliance with the Policy, including remediation of positions in those holdings as necessary.
Internal Number: 6008877
eFinancialCareers is a career site specializing in financial services.