Oportun. Inc

Security Analyst - CSOC

Req No.
2021-10605
Department
Security
Type
Regular Full-Time
Remote / WFH
Yes
Job Locations
IN-TN-Chennai

Company Overview

ABOUT OPORTUN

Oportun (Nasdaq: OPRT) is a financial services company and digital platform that provides responsible consumer credit to hardworking people. Using A.I.-driven models that are built on years of proprietary customer insights and billions of unique data points, we have extended millions of loans and billions in affordable credit, providing our customers with alternatives to payday and auto title loans. In recognition of our responsibly designed products which help consumers build their credit history, we have been certified as a Community Development Financial Institution (CDFI) since 2009.

 

OPORTUN’S IMPACT

Since extending our first loan in 2006, Oportun has made over 4 million loans, totaling over $10 billion to hardworking low- and moderate-income individuals. In turn, Oportun has helped more than 905,000 people begin establishing the credit history required to enter the financial mainstream. At the same time, Oportun’s customers have saved an estimated $1.9 billion in interest and fees compared to the alternatives typically available to them.

 

Department Overview

ABOUT TECHNOLOGY @ OPORTUN

Artificial Intelligence and a digital platform are essential to our ability to fulfill Oportun’s financially inclusive mission. The Technology team @ Oportun is dedicated to this mission which we enable by creating, delivering, and maintaining elegant, intuitive, and performant systems to support the needs of our customers and business partners.

Overview

The Cyber Security Operations Analyst is tasked with the initial triage and classification of security events at the ground level, supplementing a 24x7x365 Security Operations Center. The role follows standard operating procedures for detecting, classifying, and reporting incidents under the supervision of the SOC Manager and in partnership with Sr Analysts.

 

Responsibilities

  • Rapidly identify, categorize and prioritize detected events using all available detection and triage tools.
  • Monitor SOC tickets (and email) and queue for prospective event reporting from various sources and individual users.
  • Independently follow procedures to contain analyze and eradicate malicious activity.
  • Execute event escalation process as necessary.
  • Ensure detected event are addressed in a rapid manner using available reporting and metrics.
  • Document analysis results, ensuring relevant details are Included.
  • Interact with other Information Security and IT Infrastructure groups as necessary.
  • Track threat trends, statistics, and key figures.

 

Qualifications

  • Working knowledge with detection tools such as EDR, Network Analytics, UBA and SIEM.
  • Ability to rapidly understand and prioritize alerts from various detection technologies (EDR, Network Traffic Analysis, UBA, etc.).
  • Experience in SIEM configuration and use across the response lifecycle.
  • Experience with packet analysis and packet capture tools (Wireshark, etc.).
  • Organizational skills and time management/ prioritization.

#LI-Remote

 

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed