IT Security Analyst

Job Description
Deploy suite of security tools, including URL filtering, SIEM, IDS/IP, and DLP.
Conduct penetration testing
Communicate security concerns to superiors
Develop best practices and security standards
Design infrastructure and drive its implementation to protect organization networks and systems.
Monitor security related tools and functions, investigate/escalate incidents using subject matter
Work closely with various Operations Team members to deploy technical controls to meet
specific security requirements
-Recommend improvements and upgrades to the security posture of the enterprise, such as
evaluation of new software/hardware required to meet a business need or designing
-Perform audit activities to report on compliance, security configurations with
developing metrics to report to senior management
Perform vulnerability scans and/or analyze results from vulnerability scans, and assist with remediation as necessary.
Ensure access to all information systems is controlled, both internally and externally, commensurate with the level of potential risk; recommend appropriate corrections.
Participate in computer security incident response efforts and other security investigation activities as assigned.
Define and implement appropriate security requirements for IT projects.
Prepare monthly trend analysis and security metric reports.
Develop a Security Awareness Program for all staff members.
Provide technical assistance to IT staff members in the detection and resolution of security problems.
Provided required technical support to resolve the issues caused by malwares, ransomware and other vulnerable applications
Conduct penetration testing
Communicate security concerns to superiors
Develop best practices and security standards
Design infrastructure and drive its implementation to protect organization networks and systems.
Monitor security related tools and functions, investigate/escalate incidents using subject matter
Work closely with various Operations Team members to deploy technical controls to meet
specific security requirements
-Recommend improvements and upgrades to the security posture of the enterprise, such as
evaluation of new software/hardware required to meet a business need or designing
-Perform audit activities to report on compliance, security configurations with
developing metrics to report to senior management
Perform vulnerability scans and/or analyze results from vulnerability scans, and assist with remediation as necessary.
Ensure access to all information systems is controlled, both internally and externally, commensurate with the level of potential risk; recommend appropriate corrections.
Participate in computer security incident response efforts and other security investigation activities as assigned.
Define and implement appropriate security requirements for IT projects.
Prepare monthly trend analysis and security metric reports.
Develop a Security Awareness Program for all staff members.
Provide technical assistance to IT staff members in the detection and resolution of security problems.
Provided required technical support to resolve the issues caused by malwares, ransomware and other vulnerable applications
Skills
Good Knowledge in creating and implementing network policies and rules in firewall and experience in multiple firewall appliances
Sound knowledge in Active directory auditing and Log analysis.
Good knowledge in network Protocols.
knowledge in administrating antivirus and DLP applications.
Strong working knowledge of web filtering applications and technologies, including Websense
Must have high-level understanding of networking in a Cisco environment.
Must have excellent written, communication, and phone skills.
Should have good understanding on the events from different platforms which includes the following (Operating system includes Microsoft, Unix, Network appliances, security products at each layers)
Candidate should be expertise in the threat intelligence model integration with SIEM to proactively detect threats
Candidate should have architecture exposure towards SIEM product
Candidate should have good understanding on log collection and parsing techniques
! TCP/IP and related protocols
! Network security design considerations
! Windows operation systems & command line tools
! Malware detection and handling techniques
! Common software vulnerabilities, exploitation techniques and countermeasures
! Working knowledge of Antivirus/IPS/firewall/SIEM/web proxy technologies
! Active Directory administration and/or network infrastructure implementation and
administration experience
Sound knowledge in Active directory auditing and Log analysis.
Good knowledge in network Protocols.
knowledge in administrating antivirus and DLP applications.
Strong working knowledge of web filtering applications and technologies, including Websense
Must have high-level understanding of networking in a Cisco environment.
Must have excellent written, communication, and phone skills.
Should have good understanding on the events from different platforms which includes the following (Operating system includes Microsoft, Unix, Network appliances, security products at each layers)
Candidate should be expertise in the threat intelligence model integration with SIEM to proactively detect threats
Candidate should have architecture exposure towards SIEM product
Candidate should have good understanding on log collection and parsing techniques
! TCP/IP and related protocols
! Network security design considerations
! Windows operation systems & command line tools
! Malware detection and handling techniques
! Common software vulnerabilities, exploitation techniques and countermeasures
! Working knowledge of Antivirus/IPS/firewall/SIEM/web proxy technologies
! Active Directory administration and/or network infrastructure implementation and
administration experience
Education
Computer Science


Post a Comment