IT Security Analyst
Key Responsibilities
- This role may require some overnight, weekend and on-call activities.
- The primary responsibilities of this role are to:
- Protect and defend: identify, analyze and mitigate threats to IT systems and/or networks.
- Use defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.
- Respond to security alerts to mitigate immediate and potential threats. Use mitigation, preparedness, and response and recovery approaches, as needed, to maintain information security and minimize impacts.
- Conduct assessments of threats and vulnerabilities; determine deviations from acceptable configurations, enterprise or local policy; assess the level of risk; and develop and/or recommend appropriate mitigation countermeasures.
- Operate and maintain: configure, tune, maintain and operate key security controls, technologies, and other risk mitigations
- As a member of the Security team, it is expected that the person in this role will:
- Execute ongoing, operational business-as-usual (BAU) tasks to meet management-defined KPIs and SLAs, and deliver security projects in line with management-defined priorities and deadlines
- Stay current with the latest security news, threats, intelligence, tactics, techniques, and vulnerabilities. Research and analyze new threats and vulnerabilities to determine exposure.
- Perform threat hunting and review, triage, investigate and escalate security alerts raised by the Group-Wide SOC team, security tools, technologies, and services (e.g. endpoint security, network security, DLP, SIEM, etc.)
- Assist and/or lead efforts to isolate, contain, respond to, and recover from security incidents
- Identify, review, prioritize, plan, coordinate, and follow-up on the remediation of vulnerabilities
- Configure, customize, tune, manage, troubleshoot, and maintain to ensure effective and efficient operation of security technologies, such as SIEM & endpoint security, intrusion detection/prevention systems, etc. This may also include scripting, automation, and orchestration across various platforms.
- Define, document, and follow approved processes for all the responsibilities included in this job description. Create and maintain documentation for systems, including design and operation.
- Review systems, configurations, and process to ensure and report on compliance with ION policy, client requirements, audit controls, regulations, and industry best practices. Provide best practice security recommendations to IT and other teams within ION, based on review results.
- Respond to information security-related inquiries and requests.
Required Skills, Experience and Qualifications
- Degree/diploma/certifications in a technology-related field and/or relevant working experience; highly desired certifications include:
- PenTest+, Security+, OSCP, CCSP, CEH, GCIH, GMON
- 3+ years' experience in IT Security and/or IT
- Must have fundamental programming/scripting capabilities (e.g. python, powershell, bash, etc.)
- Must have in-depth understanding of operating systems (Windows/Linux)
- The following general characteristics are required:
- A team player with the ability to work independently and unsupervised
- Ability to own delegated tasks and see them through to completion
- Ability to manage time and prioritize work to maximize productivity
- Excellent communication skills (both written and verbal)
- Exceptional attention to detail and quality
- Excellent problem-solving techniques and trouble analysis skills
- The candidate should have a good knowledge of:
- Endpoint security concepts, controls, and best practices for Servers (e.g. Windows and Linux)
- General IT networking concepts, protocols, standards and network security concepts, controls, and best practices
- Cryptography fundamentals and data security controls and best practices
- Forensic investigation techniques
- Prior experience deploying, configuring, managing, and/or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerability management, MDM, etc.
Get notified for similar jobs
Sign up to receive job alerts