Sr IT Info Security Analyst
Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Maintains hardware, software and network firewalls and encryption protocols. Administers cybersecurity policies to control physical and virtual access to systems. Performs network security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Conducts penetration testing and vulnerability assessments of applications, operating systems and/or networks. Responds to cybersecurity breaches, identifies intrusions and isolates, blocks and removes unauthorized access. Researches and evaluates cybersecurity threats and performs root cause analysis. Assists in the creation and implementation of security solutions. Provides information to management regarding impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Able to work in 24/7 shifts.
Responsibilities
Incident Response
- Respond to computer security incidents according to the security incident process. Provide guidance to first responders for handling information security incidents. Coordinate efforts among multiple departments during response. Provide timely and relevant updates to appropriate leaders and decision makers. Provide investigation findings to relevant business units to help improve information security posture. Validate and maintain incident response plan and processes to address potential threats! Write scripts and configure tools to automate analysis.- Compile and analyze data for management reporting and metrics. Analyze potential impact of new threats and exploits and communicate risks. Perform hunting in logs and security tools for signs of compromise or breach.
- Monitor information security related Web sites (US-CERT, SANS Internet Storm Center, etc.) and mailing lists (DHS Infrastructure, BugTraq, etc.) to stay up to date on current attacks and trends. Interpret penetration results and validate closure. Use vulnerability and web application scanner to monitor for vulnerabilities and ensure tickets are assigned and tracked to meet patching SLA. Work with solution engineers to test and configure the WAF to patch web server vulnerabilities and prevent breaches! Report vulnerability management metrics Compliance. Review and update procedures for the organization. Ensure there is evidence for procedures being followed. Perform regular reviews and internal audits as necessary
Qualifications
Qualifications: Any degree with Major in Electronics or computers
Skill requirements:
Professional with demonstrable ability to work effectively with other business units, IT management and staff, vendors, and consultants. Good communication skills such as planning and leading effective meetings, conducting structured interviews to collect information, interpersonal and negotiation skills, and addressing to a variety of audiences. Advanced skills to present information to partners and/or decision makers in an effective and professional deliverable