|
Current Employees and Contractors Apply Here
Osaic Careers
IT Opportunity in Financial Services Advisor Security Analyst II Location(s): Atlanta: 2300 Windy Ridge Pkwy SE, Suite750, Atlanta, GA 30339 La Vista:12325 Port Grace Blvd, La Vista, NE 68128 Oakdale: 7755 3rd St. N, Oakdale, MN 55128 Scottsdale: 18700 N Hayden Rd, Suite 255, Scottsdale, AZ 85255 St. Petersburg: 877 Executive Center Dr. W, Suite 300, St. Petersburg, FL 33702 Osaic has returned to the office on a hybrid schedule requiring a minimum of 4 days weekly in the office. Applicants should be located at one of our hubs listed above and must be willing to work this schedule. Role Type: Full-time, Non-Exempt Salary: $80,000 - $100,000 per year + annual performance-based bonus Actual compensation offered will be determined individually, based on a number of job-related factors, including location, skills, licensure, experience, and education. Our competitive compensation is just one component of Osaic's total compensation package. Additional benefits include health, vision, dental insurance, 401k, paid time away, volunteer days and much more. To view more details of what you can look forward to, visit our careers page:Osaic Benefits. Summary: The Advisor Security Analyst II at Osaic serves as an experienced security analyst responsible for independently executing advanced incident triage, threat analysis, and technical investigations. This role plays a key part in protecting Osaic's Financial Professionals, clients, and platforms by identifying, analyzing, and responding to security events across the enterprise. The Level 2 analyst works crossfunctionally with IT, Compliance, Risk, and specialized cyber teams, and acts as a technical escalation point for Level 1 analysts. This position requires strong analytical skills, proficiency with enterprise security tools, and the ability to communicate clearly with both technical teams and nontechnical financial professionals. The ideal candidate is an experienced analyst ready to take ownership of complex investigations, provide highquality support to Osaic's Financial Professionals, and collaborate across teams to defend sensitive financial data. They are detailoriented, decisive, technically skilled, and able to communicate confidently with both cybersecurity experts and nontechnical advisors. Education Requirements: Bachelor's degree preferred, high school diploma (or equivalent) in combination with experience will be considered in lieu of degree. Minimum of high school diploma or equivalent is required. Responsibilities: Advanced Incident Triage & Threat Investigation
- Lead independent execution of security investigations from detection to containment across email, endpoint, identity, and network security platforms.
- Perform advanced incident triage, validating complex alerts and prioritizing events based on risk to financial professionals and sensitive client data.
- Conduct intermediate threat analysis, including identifying attacker behavior, analyzing indicators of compromise, and determining potential business impact.
- Escalate critical threats to senior analysts or IR teams with complete technical context and clear recommended actions.
Support for Osaic Financial Professionals
- Provide elevated cybersecurity support for Osaic's Financial Professionals regarding suspicious activity, compromised accounts, secure configurations, and advanced phishing/social engineering cases.
- Translate technical findings into clear, actionable guidance tailored to financial professionals who may not have deep technical backgrounds.
- Assist advisors in understanding and complying with Osaic security requirements and industryregulated best practices.
Security Tools & Technical Proficiency
- Demonstrate proficiency with Osaic's security tools, including SIEM, EDR, identity security, cloud security platforms, and email security systems.
- Perform log analysis, endpoint deep dives, and artifact collection to support threat investigation and incident containment.
- Conduct technical troubleshooting across multiple platforms, including Windows, macOS, cloud environments, and mobile devices used by financial professionals.
Compliance, Policy Awareness & Documentation
- Ensure all investigative actions align with Osaic policies, FINRA/SEC regulations, and cybersecurity best practices.
- Document detailed findings, investigative steps, and recommendations within case management and ticketing systems.
- Identify gaps or recurring issues and recommend enhancements to playbooks, security controls, and advisor-facing guidance.
Collaboration & Escalation Leadership
- Work closely with IT, Compliance, Identity & Access Management, and senior cybersecurity teams to coordinate responses to complex incidents.
- Serve as a technical escalation point for Level 1 analysts, providing coaching and guidance when needed.
- Participate in postincident reviews, contributing technical insights and improvement opportunities.
Basic Requirements:
- One of the following: CompTIA Security+, SSCP (Systems Security Certified Practitioner), CEH (Certified Ethical Hacker)
- Ability to independently execute triage, investigation, and containment actions with minimal supervision.
- Advanced proficiency in incident analysis, threat identification, and security alert prioritization.
- Strong technical troubleshooting skills across various operating systems, applications, cloud services, and advisorfacing platforms.
- Solid understanding of security policies, regulatory obligations (FINRA, SEC), and compliance-driven security requirements.
- Proficiency with enterprise security tools such as SIEM, EDR, secure email gateways, identity protection, and cloud security solutions.
- Ability to collaborate effectively across teams and escalate complex issues with clarity and precision.
- Excellent communication skills to assist financial professionals with cyber questions via phone and support ticket systems
- Strong written and verbal communication skills, including the ability to translate technical findings for financial professionals.
Preferred Requirements:
- Experience working in financial services, supporting financial professionals, or operating in a regulated environment.
- Exposure to threat intelligence, MITRE ATT&CK, or automation/orchestration tools.
- Familiarity with identity governance, MFA platforms, and cloud security (Microsoft, Okta, AWS, etc.).
Current Employees and Contractors Apply Here
|