FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Securities Research Analyst

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Securities Research Analyst Skills

Below we've compiled a list of the most important skills for a Securities Research Analyst. We ranked the top skills based on the percentage of Securities Research Analyst resumes they appeared on. For example, 7.4% of Securities Research Analyst resumes contained Research Paper as a skill. Let's find out what skills a Securities Research Analyst actually needs in order to be successful in the workplace.

These are the most important skills for a Securities Research Analyst:

1. Research Paper

demand arrow
high Demand
Here's how Research Paper is used in Securities Research Analyst jobs:
  • Researched and produced research papers on the relationship between Russia and the North Caucasus.
  • Research paper publicized on Economic & Social Development Research (Issue NO.
  • Research paper titled "Methodology on Cyber-Criminal Profiling" has been published in the Information Security Journal: Global Perspective.

Show More

2. Vulnerability Assessments

demand arrow
high Demand
Here's how Vulnerability Assessments is used in Securities Research Analyst jobs:
  • Provided penetration testing and vulnerability assessments for clients requiring such testing for compliance or general best practice.

Show More

3 Vulnerability Assessments Jobs

No jobs at selected location

3. Web Application

demand arrow
high Demand
Here's how Web Application is used in Securities Research Analyst jobs:
  • Researched and recommended configurations of application vulnerability scanners and source code scanners specifically for the company's web applications.
  • Web Application Firewall product development IDS event management product development IDS/IPS signature optimization Vulnerability research and Threat Modeling Knowledge base development

Show More

4. Security Policies

demand arrow
high Demand
Here's how Security Policies is used in Securities Research Analyst jobs:
  • Formed J2EE security policies using both declarative and programmatic strategies.
  • Reviewed existing application security policies and controls, recommended additions and updates to existing policies to address shortcomings.

Show More

5. Cyber

demand arrow
high Demand
Here's how Cyber is used in Securities Research Analyst jobs:
  • Maintain and contribute content to the Department of Information Technology internal and external cybersecurity websites.
  • Prepare documents and presentations in support of state cybersecurity outreach efforts.
  • Developed a methodology on cyber-criminal profiling.
  • Provide continuous help desk support for 40,000 personnel during the implementation and operation of Maryland's statewide cyber security training program.
  • Maintain the Governor's cybersecurity dashboard while cyclically collecting data to support the reporting tool.
  • Establish and maintain a statewide contacts database of agency cybersecurity personnel as well as their 360 executive and support organization staff.
  • Research cyber-security subject matter, compile data, and present clear, concise reports including comprehensive state of the art solutions.

Show More

23 Cyber Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. SQL

demand arrow
high Demand
Here's how SQL is used in Securities Research Analyst jobs:
  • Utilized SQL and/ or Excel to analyze and summarize data.
  • Administer and monitor all backend systems, SQL databases and tools.
  • Implemented a RESTful back-end using Django and MySQL which is hosted on AWS in Ubuntu system.

Show More

2 SQL Jobs

No jobs at selected location

7. Linux

demand arrow
high Demand
Here's how Linux is used in Securities Research Analyst jobs:
  • Created a high interaction honeypot deployment with the use of three separate machines running Linux exclusively.

Show More

8. Python

demand arrow
high Demand
Here's how Python is used in Securities Research Analyst jobs:
  • Coded Python scripts for tools to support security research.
  • Automated the entire static analysis using Python and Shell scripts

Show More

2 Python Jobs

No jobs at selected location

9. Network Security

demand arrow
high Demand
Here's how Network Security is used in Securities Research Analyst jobs:
  • Project consulting in developing network security architecture.
  • Experienced researcher and lead software engineer on network security, intrusion detection, and PKI.
  • Conducted research on network security issues including cryptographic key management, security association management, and network security protocols.

Show More

5 Network Security Jobs

No jobs at selected location

10. Assurance

demand arrow
high Demand
Here's how Assurance is used in Securities Research Analyst jobs:
  • Developed curriculum and facilitated information assurance awareness training in government management and employees.

Show More

1 Assurance Jobs

No jobs at selected location

11. Cloud

demand arrow
high Demand
5 Cloud Jobs

No jobs at selected location

12. Information Security

demand arrow
high Demand
Here's how Information Security is used in Securities Research Analyst jobs:
  • Program Management: Developed a standardized information security metrics program to bring the lab into compliance with federal mandates.

Show More

1 Information Security Jobs

No jobs at selected location

13. Bloomberg

demand arrow
high Demand
Here's how Bloomberg is used in Securities Research Analyst jobs:
  • Used Bloomberg APIs to create custom data-pull macros to automate data gathering.

Show More

14. Osint

demand arrow
high Demand
Here's how Osint is used in Securities Research Analyst jobs:
  • Developed CI/OPSEC/OSINT protection policy for national intelligence programs.
  • Conducted malware behavior analysis and OSINT research.

Show More

1 Osint Jobs

No jobs at selected location

15. ISO

demand arrow
average Demand
Here's how ISO is used in Securities Research Analyst jobs:
  • Utilize NIST 800 series and ISO 27001 standards.
  • Served as a Research/Securities Analyst for a successful financial advisor in the Wealth Management Division at First Tennessee Bank.

Show More

16. Security Research

demand arrow
average Demand
Here's how Security Research is used in Securities Research Analyst jobs:
  • Completed homeland security research projects, including comprehensive analyses of state homeland security structures and homeland security business market development.
  • Certified SME mastery of subject matter advanced security researcher and application of advanced penetration methodologies.

Show More

19 Security Research Jobs

No jobs at selected location

17. Recovery Procedures

demand arrow
average Demand

18. Data Analysis

demand arrow
average Demand
Here's how Data Analysis is used in Securities Research Analyst jobs:
  • Created business rules based on the data analysis to improve content classification quality and efficiency.

Show More

19. Network Traffic

demand arrow
average Demand
2 Network Traffic Jobs

No jobs at selected location

20. IP

demand arrow
average Demand
Here's how IP is used in Securities Research Analyst jobs:
  • Conduct target development, develop target strategies, provide operational analysis, and create network diagrams to facilitate communication with leadership.
  • Documented history of boosting recruiting productivity metrics, along with demonstrating leadership and high level management qualities.
  • Provided internal analysis of municipal arbitrage opportunities and portfolio variance to fixed-income traders.
  • Key participant in several state-level tabletop and full-scale exercises for emergency response actions.
  • Drive security fixes and enhancements by organizing interdisciplinary teams of product specialists.
  • Research and implementation of educational modules in accordance with FISMA, NIST, FIPS and preceding and related federal regulations.
  • Formulate the detailed and precise description regarding the cause of the vulnerabilities and fix recommendations in the scanning report.
  • Maintained all aspects of customer relationship from creating scopes, leading engagement kick-off meetings to final report delivery.
  • Compile and reports trend analysis information for Standardization and Evaluation to CEO and key leadership.
  • Participated in a risk assessment project that served as data for a graduate thesis.
  • Analyzed data breach, Website vulnerabilities, cross scripting, and database vulnerabilities.
  • Facilitate harmonious, productive relationships between senior managers, vendors and clients.
  • Provided consultation on compliance requirements and assessments for HIPPA and PCI standards.
  • Established relationships with US, Canadian, and Caribbean exchanges : NYSE, NASDAQ, ARCA, TSX, TVX.
  • Designed an ATM multicast group authorization framework which handle delegation and acquisition of authority in an environment of multiple administrative domains.
  • Authored deployment descriptor authorization, login and principal delegation hints.
  • Debugged the ComTest tool, an open source Eclipse plugin used for combinatorial software testing of Java code.
  • Developed relationships with transfer agents: Bank of New York, JP Morgan, CitiBank, Deutsche Bank.
  • Extracted reports from multiple sources (e.g.
  • Participated in internal hackathons to safely exploit and report vulnerabilities.

Show More

3 IP Jobs

No jobs at selected location

21. DOD

demand arrow
average Demand
Here's how DOD is used in Securities Research Analyst jobs:
  • Hosted panel discussions involving DOD officials and defense industry experts.

Show More

22. Security Issues

demand arrow
average Demand
10 Security Issues Jobs

No jobs at selected location

23. Firewall

demand arrow
average Demand
Here's how Firewall is used in Securities Research Analyst jobs:
  • Schedule day to day firewall related changes and seek CAB approval if required for production impacting changes.

Show More

24. Application Security

demand arrow
average Demand
Here's how Application Security is used in Securities Research Analyst jobs:
  • Reviewed existing policies and controls for application security and defined a new set of standards and procedures.

Show More

4 Application Security Jobs

No jobs at selected location

25. Potential Threats

demand arrow
average Demand
Here's how Potential Threats is used in Securities Research Analyst jobs:
  • Designed and tested simulations of potential threats to the population.

Show More

26. Background Checks

demand arrow
average Demand

27. C++

demand arrow
average Demand
Here's how C++ is used in Securities Research Analyst jobs:
  • Debugged and fixed securityrelated bugs in C/C++ code.

Show More

28. C #

demand arrow
average Demand

29. DHS

demand arrow
average Demand
Here's how DHS is used in Securities Research Analyst jobs:
  • Conducted research and outreach for DHS's Lessons Learned Information Sharing (LLIS.gov).

Show More

30. Unix

demand arrow
low Demand
Here's how Unix is used in Securities Research Analyst jobs:
  • Created and managed virtual and physical networks of over 400 Windows, Unix, Firewall and Router systems2015-2016Activities

Show More

31. Html

demand arrow
low Demand

32. International Affairs

demand arrow
low Demand

33. Investment Strategies

demand arrow
low Demand

34. Customer Service

demand arrow
low Demand
Here's how Customer Service is used in Securities Research Analyst jobs:
  • Verified all investment securities were properly structured and all customers were provided with detailed customer service.

Show More

35. Information Technology

demand arrow
low Demand
1 Information Technology Jobs

No jobs at selected location

36. Government Agencies

demand arrow
low Demand
Here's how Government Agencies is used in Securities Research Analyst jobs:
  • Maintain communication links with government agencies and financial institutions.

Show More

1 Government Agencies Jobs

No jobs at selected location

37. Ddos

demand arrow
low Demand

38. Ethnic Groups

demand arrow
low Demand

39. Access Control

demand arrow
low Demand
Here's how Access Control is used in Securities Research Analyst jobs:
  • Designed an access control framework capable of performing logical reasoning in identifying contradictory and redundant security policies.
  • Explore the effectiveness of API-Level Access Control using Bytecode rewriting in android.

Show More

1 Access Control Jobs

No jobs at selected location

40. Analysis Tools

demand arrow
low Demand

41. OS

demand arrow
low Demand
Here's how OS is used in Securities Research Analyst jobs:
  • Performed red team activities to verify and test application and network configuration, and vulnerability exposures.
  • Updated and maintained real-time pricing database to assist research analysts in preparing arbitrage proposals.
  • Provided meaningful technical content on multiple proposals that resulted in successful contracts awards.
  • Postulated centering SIEM correlations around money transfers at financial institutions.
  • Research was focused on the cultural and ethnic history of the North Caucasus and the treatment of those groups by Russia.
  • Tasked with exploiting and reporting bugs on closed and open networks as well as applications, websites, and servers.
  • Concluded that an attack by a terrorist faction operating in the Caucasus is in fact a very real possibility.
  • Operate, maintain and troubleshoot store's POS, inventory, customer and vendor control systems.
  • Edit and proof government submissions, proposals and invoicing via WAWF and MPO system.
  • Demoed new products and product enhancements to current and prospective clients.
  • Reduce the false positives compared to the previous detection rules.
  • Acted as the blue team in defend/attack practice scenarios.
  • Prepared budget estimates for cost of system acquired.
  • Completed subscriber set ups through Titan, Wins, Wins USMT, Wins Boston, GTI.
  • Researched equity valuations across various publically traded securities.
  • Developed, composed, and published Operations Security (OPSEC) requirements and policy for multiple national intelligence programs.
  • Implemented an Android and iOS cross platform app with React Native.
  • Forecasted company financials using models sourced with information from earnings releases and sell-side research reports that resulted in positive alpha.
  • Co-authored and presented company and industry reports to convey investment thesis across healthcare and industrial sectors.
  • Peerreviewed source code and created upstream patches in git repositories.

Show More

42. Cusip

demand arrow
low Demand
Here's how Cusip is used in Securities Research Analyst jobs:
  • Added or updated securities on internal platform to prepare cusips for trading.
  • Research securities (CUSIP, ISIN, SEDOL ) using variety vendor sources (i.e.

Show More

43. Cctv

demand arrow
low Demand
Here's how Cctv is used in Securities Research Analyst jobs:
  • Inspect electronic security systems such as CCTV, alarm systems Surveillance and Personal protection etc.

Show More

44. USB

demand arrow
low Demand

45. Ospf

demand arrow
low Demand
Here's how Ospf is used in Securities Research Analyst jobs:
  • Experienced with configuring routing protocols such as OSPF, EIGRP, BGP as required.

Show More

46. Project Management

demand arrow
low Demand
Here's how Project Management is used in Securities Research Analyst jobs:
  • Performed independent research, analysis and project management functions.
  • Experience in project management with a focus on group organization.

Show More

47. Windbg

demand arrow
low Demand

48. Itil

demand arrow
low Demand

49. URL

demand arrow
low Demand

50. PHP

demand arrow
low Demand

Securities Research Analyst Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Securities Research Analyst

Research Paper

11.4%

Vulnerability Assessments

11.4%

Web Application

9.1%

Security Policies

8.6%

Cyber

7.3%

SQL

6.4%

Linux

5.9%

Python

4.1%

Network Security

4.1%

Assurance

3.6%

Cloud

3.2%

Information Security

3.2%

Bloomberg

3.2%

Osint

3.2%

ISO

2.7%

Security Research

2.7%

Recovery Procedures

2.7%

Data Analysis

2.7%

Network Traffic

2.3%

IP

2.3%
Show More

Typical Skill-Sets Required For A Securities Research Analyst

Rank Skill
1 Research Paper 7.4%
2 Vulnerability Assessments 7.4%
3 Web Application 5.9%
4 Security Policies 5.6%
5 Cyber 4.7%
6 SQL 4.1%
7 Linux 3.8%
8 Python 2.7%
9 Network Security 2.7%
10 Assurance 2.4%
11 Cloud 2.1%
12 Information Security 2.1%
13 Bloomberg 2.1%
14 Osint 2.1%
15 ISO 1.8%
16 Security Research 1.8%
17 Recovery Procedures 1.8%
18 Data Analysis 1.8%
19 Network Traffic 1.5%
20 IP 1.5%
21 DOD 1.5%
22 Security Issues 1.5%
23 Firewall 1.5%
24 Application Security 1.5%
25 Potential Threats 1.5%
26 Background Checks 1.5%
27 C++ 1.5%
28 C # 1.2%
29 DHS 1.2%
30 Unix 1.2%
31 Html 1.2%
32 International Affairs 1.2%
33 Investment Strategies 1.2%
34 Customer Service 1.2%
35 Information Technology 1.2%
36 Government Agencies 1.2%
37 Ddos 1.2%
38 Ethnic Groups 1.2%
39 Access Control 1.2%
40 Analysis Tools 1.2%
41 OS 1.2%
42 Cusip 0.9%
43 Cctv 0.9%
44 USB 0.9%
45 Ospf 0.9%
46 Project Management 0.9%
47 Windbg 0.9%
48 Itil 0.9%
49 URL 0.9%
50 PHP 0.9%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

10,719 Securities Research Analyst Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.