Truly a key role with our customer who is targeting both Information Security Analysts who are both Technical and Compliance-minded
Growth mindset and someone who is confident in what they know, and aware of what they don’t.
- Primarily responsible for securing our customer's environment.
- Can engage outside support to help in areas where light, for learning
- Stay abreast of new technology and potential threats. Planner/proactive
- Have your back to support, but if general or unpatched systems and breach, not a good situation
- Certs are a plus, but can obtain those they don't have
- Growth opportunities likely and the position is highly visible (= +/-)
- Assist in leading and assessing/implementing of solutions.
Company Description
SECURITY ANALYST
Requirements and Competencies:
B.S. /B.A. Degree (Computer Science, Security).
- 5+ years of experience working as a Cyber Security Analyst, Security Operations Analyst OR SOC Analyst would be highly preferable.
- 3+ years of Incident response and investigations experience.
- 3+ years of practical experience across the following technologies: EDR, Anti-Virus, Firewall, Network protocols, Windows security events, Phishing mitigation, WireShark, MS Office (Excel in particular). * Familiarity with the following: Permissions management, DLP, Active Directory, VPN, PowerShell (or any high-level programming language).
- Managed security measures and operated software to protect systems and information infrastructure, including firewalls and data encryption programs.
- Prior experience in threat hunting, threat research and threat intelligence skills.
- Conducted vulnerability assessments and relevant incident response.
- Analyzed SIEM events.
- Strong understanding of networking technology.
- Great collaboration, interpersonal, and communication skills.
- Advanced analytical and problem-solving abilities.
- Excellent organizational and time-management skills.
Primary Responsibilities:
- Responsible for the overall monitoring and management of all security service categories including Policy Development, Security Training, Identity and Access Mgmt., Firewall Device Mgmt., Threat Detection/Response, and other categories as designated.
- Ensuring the security technology provided by the organization is performing to optimal standards.
- Conduct open-source and closed-source threat intelligence.
- Work with the wider team to enhance the cyber security environment.
- Monitors computer networks for security issues.
- Investigate and mitigate security breaches and other cybersecurity incidents.
- Installs security measures and operates software to protect systems and information infrastructure, including firewalls and data encryption programs.
- Documents security breaches and assesses any damages caused.
- Performs tests and uncovers network vulnerabilities.
- Fixes detected vulnerabilities to maintain a high-security standard.
- Researches and recommends security enhancements.
- Stay up-to-date on information technology trends and security standards to become the subject matter expert.
- Knowledge of information security engineering methods and technologies for IT infrastructure, web, mobility, and WAN / LAN networking, and patch management.
- Ability to direct, control and plan development of IT security programs that will meet current and future needs.
- Assists in revising and updating the Information System Security Policy and Incident Response Plan.
- Performs daily systems/network security event monitoring.
- Performs security hardening and configuration reviews in coordination with System Admins.
- Troubleshooting of security systems and devices (configuration, permissions, feature compatibility, etc.)
- Manage Security Incident Response with wider team.
- Manages vulnerability scanning tools and responds to results with change requests to address high severity issues.
- Manage Firewalls, Threat Detection, and other security tool configurations; managing protection rules, performing updates, licenses renewals as needed.
- Responsible for information security procedural knowledge documentation.
- Works with security vendors and other external partners to resolve issues.
- Participates in annual security device inventory and support/licensing review effort.
- Trains staff on network and information security procedures.
- Monitors security access management logs and other security metrics
- Prepares reports by collecting, analyzing, and summarizing information regarding security operations and processes.
- Responds to emergency situations as needed, during and after normal business hours, to identify, assess and mitigate critical operational issues.