Security Analyst
Listed on 2026-01-19
-
IT/Tech
Cybersecurity, IT Consultant, Information Security
Position Overview
At PNC, our people are our greatest differentiator and competitive advantage in the markets we serve. We are all united in delivering the best experience for our customers. We work together each day to foster an inclusive workplace culture where all of our employees feel respected, valued and have an opportunity to contribute to the company’s success. As a Security Staff Manager within PNC's CYBER DEFENSE organization, you will be based in Pittsburgh, PA.
- Power Shell
- Python or Bash
- IP addressing
- Routing basics
- The candidate should have familiarity with the process of registering, maintaining, and decommissioning domains.
- The candidate should have experience managing domain inventory for a large enterprise/corporation.
- The candidate should have an understanding of DNS, ICANN, networking, and internet infrastructure.
- This candidate will be a founding member of a newly formed team focused on the management of PNC's enterprise domain inventory.
- Partner with internal teams to develop a system of record, implement an enterprise-wide policy for governance, and ensure that the complete domain lifecycle (creation, maintenance, decommissioning) is accounted for in processes and procedures.
- Work closely with the lines of businesses, technology, and security teams to develop an accurate domain inventory.
- The candidate should have familiarity with the process of registering, maintaining, and decommissioning domains.
- The candidate should have experience managing domain inventory for a large enterprise/corporation.
- The candidate should have an understanding of DNS, ICANN, networking, and internet infrastructure.
PNC will not provide sponsorship for employment visas or participate in STEM OPT for this position.
In office. Monday – Friday 8:00 am – 5:00 pm EST.
Job Description- Provides technical evaluation and analysis. Supports activities, process, and tools needed to improve overall security posture of the organization.
- Applies security concepts, reviews information, executes defined tasks, analyzes requirements, reviews logs, and creates documentation. Performs investigation and data loss prevention, data manipulation, and coordination of activities. Performs actions to address or mitigate risks and vulnerabilities. Reviews and defines controls.
- Advises on more complex security procedures and products for clients, security administrators and network operations. Participates in enforcement of control security risks and threats; potential of one or more controls subject to manager discretion. Shares knowledge with staff.
- Conducts security assessments and other information security routines consistently. Investigates and recommends corrective actions for data security related to established guidelines.
PNC Employees take pride in our reputation and to continue building upon that we expect our employees to be:
- Customer Focused – Knowledgeable of the values and practices that align customer needs and satisfaction as primary considerations in all business decisions and able to leverage that information in creating customized customer solutions.
- Managing Risk – Assessing and effectively managing all of the risks associated with their business objectives and activities to ensure they adhere to and support PNC's Enterprise Risk Management Framework.
Successful candidates must demonstrate appropriate knowledge, skills, and abilities for a role. Listed below are skills, competencies, work experience, education, and required certifications/licensures needed to be successful in this position.
Preferred Skills- Access Control (AC)
- Bash (Programming Language)
- Building Architecture
- Customer Solutions
- Disaster Recovery Planning
- Information Security
- IP Addressing
- Microsoft Power Shell
- Network Security
- Physical Security
- Python (Programming Language)
- Risk Assessments
- Security Technologies
- Analytical Thinking
- Effective Communications
- Information Assurance
- Information Security Management
- Information Security Technologies
- IT Environment
- IT Standards, Procedures & Policies
- IT Systems Management
- Problem Solving
- Software Security Assurance
Roles at this…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).