Technology Security Analyst at Flagstar Bank
Troy, Michigan, USA -
Full Time


Start Date

Immediate

Expiry Date

19 Nov, 25

Salary

0.0

Posted On

19 Aug, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Computer Science, Siem, Critical Thinking, Incident Response, Firewalls, Ged, It Support, Telemetry, Ips, Communication Skills, Security Tools, Network Security, Completion, Ids, Edr, Information Technology, Confidentiality, Linux System Administration

Industry

Information Technology/IT

Description

Position Title
Technology Security Analyst
Location
Troy, MI 48098
Job Summary
The Technology Security Analyst role is a vital member of our cybersecurity team, responsible for proactive monitoring, rapid incident response, and day-to-day management of our security posture. This role is at the forefront of protecting our organization’s information assets, primarily focused on the detection, analysis, and escalation of security events and the efficient resolution of security incidents and inquiries. The analyst will leverage various security tools and platforms to identify and mitigate cyber threats across on-premises and cloud environments, ensuring continuous compliance with critical financial industry regulations and internal security policies.

Job Responsibilities:

  • Perform real-time, continuous monitoring and analysis of security alerts and events generated from various security solutions to detect suspicious or malicious activity.
  • Triage, investigate, and correlate security incidents and alerts to determine their nature, scope, and impact; execute response actions per incident response playbooks and SOPs.
  • Manage and resolve incident tickets and service requests related to cybersecurity, including access issues, suspicious activity reports, and policy exceptions.
  • Contribute to tuning and optimization of security tools and systems to improve detection capabilities and reduce false positives.
  • Collaborate with IT teams (e.g., Network, Systems, Application Development) to address security concerns and implement security best practices.
  • Develop, refine, and maintain operational documentation including playbooks, incident response procedures, and technical guides.
  • Maintain current knowledge of cyber threats, vulnerabilities, and attack methodologies to inform monitoring strategies and response plans.
  • Uses independent judgement and discretion to make decisions on escalating incidents, tuning detection rules, and determining appropriate incident handling steps.
  • Analyzes and resolves problems related to complex network access issues, endpoint anomalies, and security system misconfigurations.

ADDITIONAL ACCOUNTABILITIES

  • Performs special projects, and additional duties and responsibilities as required.
  • Consistently adheres to regulatory and compliance policies and standards linked to the job as listed and complete required compliance trainings. Accountable to maintain compliance with applicable federal, state and local laws and regulations.
  • Required to participate in an on-call rotation schedule to provide 24/7 security support and incident response.

JOB REQUIREMENTS

Required Qualifications:

  • Education level required: High School / High School Equivalency (GED, HiSET, TASC) / Foreign Equivalent High School Diploma or GED is required. Associate’s degree in Cybersecurity, Information Technology, or a related field or equivalent practical experience strongly preferred.
  • Minimum experience required: 2+ Years in IT support, network/system administration, or foundational cybersecurity role.
  • Demonstrated understanding of cybersecurity principles, including threat detection, incident response, and network security.
  • Familiarity with tools such as SIEM, firewalls, EDR, and IDS/IPS. Completion of cybersecurity coursework or certifications or equivalent is a plus.

Preferred Qualifications:

  • Education level preferred: College, Vocational or Associates Degree (2 years or equivalent) Associate’s or Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.
  • Preferred certifications: CompTIA Security+, or equivalent cybersecurity-related certifications.

Job Competencies:

  • Foundational knowledge of network security, common cyberattack techniques, and security principles.
  • Basic understanding of Windows and/or Linux system administration.
  • Ability to interpret and analyze logs, alerts, and telemetry from security tools.
  • Strong attention to detail, critical thinking, and troubleshooting skills.
  • Demonstrates a strong ability to build and maintain effective relationships with stakeholders by communicating clearly, engaging in proactive collaboration, and leveraging cross-functional insights. Aligns relationship-building efforts with enterprise goals to accelerate performance and drive strategic results.
  • Builds trusted client relationships, whether internal or external, by identifying needs and delivering tailored solutions to enhance the overall client experience.
  • Ability to work in a team-oriented environment and follow established procedures and protocols.
  • Strong written and verbal communication skills; able to articulate technical details clearly to both technical and non-technical audiences.
  • Ability to maintain confidentiality and handle sensitive data responsibly.
  • Travel requirements: Minimal (0-10%)
  • Physical demands (ADA): No unusual physical exertion is involved.

Flagstar is an Equal Opportunity Employer
Flagstar provides teammates access to a variety of benefits including medical, dental, vision, life, and disability insurance, as well as a comprehensive leave program. Please click the following link for detailed information:
Benefits | Flagstar Ban

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities
  • Perform real-time, continuous monitoring and analysis of security alerts and events generated from various security solutions to detect suspicious or malicious activity.
  • Triage, investigate, and correlate security incidents and alerts to determine their nature, scope, and impact; execute response actions per incident response playbooks and SOPs.
  • Manage and resolve incident tickets and service requests related to cybersecurity, including access issues, suspicious activity reports, and policy exceptions.
  • Contribute to tuning and optimization of security tools and systems to improve detection capabilities and reduce false positives.
  • Collaborate with IT teams (e.g., Network, Systems, Application Development) to address security concerns and implement security best practices.
  • Develop, refine, and maintain operational documentation including playbooks, incident response procedures, and technical guides.
  • Maintain current knowledge of cyber threats, vulnerabilities, and attack methodologies to inform monitoring strategies and response plans.
  • Uses independent judgement and discretion to make decisions on escalating incidents, tuning detection rules, and determining appropriate incident handling steps.
  • Analyzes and resolves problems related to complex network access issues, endpoint anomalies, and security system misconfigurations
Loading...