We are currently seeking a talented Information Security Advisor l for the Phoenix location or 100 % Remote Work Environment. Community: Enterprise Information Security Jobs that are part of a community have unique requirements established to maintain consistent application, usage and reporting structure. Please reach out to your HR Business Partner for additional information on specific requirements prior to posting and/or employee placement into this job. Investigates, analyzes, and responds to security anomalies and events (e.g. suspicious behavior, attacks, and security breaches) within USAA's environments using a variety of cyber defense tools to detect and respond to threats. Conducts vulnerability, security configuration, and/or penetration testing assessments of systems and networks. Identifies cyber threats, analyzes operational impacts and communicates to appropriate stakeholders. Stays current with latest information security threats, exploits, trends, and intelligence. Job Requirements Job Tasks: Researches and analyzes the latest information security vulnerabilities, threats, exploits, trends and intelligence. Conducts routine vulnerability management, security configuration assessments, and/or penetration testing operations and manages the resulting findings. Monitors internal and external networks, systems, and applications for security anomalies and events (e.g. suspicious behavior, attacks, and security breaches). Responds to cyber incidents, performing detailed analysis using complex security tools to determine root cause. Must use a broad range of demonstrated experience (e.g. forensics, networking, servers, coding, etc.) to determine a malicious actor's tactics, techniques and procedures. Uses the discoveries from the incident response process to make moderately complex improvements to the existing detection capabilities and security controls. Prepares written briefs with recommendations to leadership on latest threats, alerts, and incidents. Work is completed independently. Serves as a resource to team members on escalated issues of an unusual nature. Identifies and manages existing and emerging risks that stem from business activities and ensures risks associated with business activities are effectively identified, measured, monitored, and controlled. Follows written risk and compliance policies and procedures for business activities. Minimum Education: Bachelor's Degree, OR, 4 additional years of related experience beyond the minimum required may be substituted in lieu of a degree. Minimum Experience: 4 or more years of related experience in Information Security, Cybersecurity and/or Information Technology to include accountability for complex tasks and/or projects. 2 or more years of related experience in Incident Response, Information Assurance, Forensics and/or Cyber Intelligence Proficient level of business acumen in the areas of business operations, risk management, industry practices and emerging trends.