As Security Analysts, we analyse and review reports, logs and various sources of informative data relating to security events. We must be knowledgeable of current security issues and compliance-related information and possess the ability to respond to security issues as needed.
In our team, the analyst uses, implements, reviews, or evaluates systems to identify threat actors in their attempts at infiltrating user, customer, or corporate information or jeopardising product infrastructure. The analyst researches and responds to attempted or successful efforts to compromise systems and protocols. The analyst performs and validates vulnerability assessment scans and works with internal teams to resolve potential risks and vulnerabilities. The analyst partners with teams to remediate identified risks and provides reports to management and customers on the impact of breaches or risks to confidentiality, integrity, availability, or disruption to delivery of services.
Responsabilități
What You Will Do:
Vulnerability management monitoring, review and follow-up
Supervise current and trending remediation efforts
Report to customers on security status of the environment including, trend analysis,remediation efforts, and newly discovered vulnerabilities
Frequently document and communicate product security risks, collaborating with internaland external partners
Serve as a technical specialist for analysing and identifying security vulnerabilities in webapplications, operating systems, and networks
Review security events that are populated in a Security Information and Event Management(SIEM) system to develop accurate remediation actions
Review, respond, and build alerts
Independently follow procedures to contain, analyse, and eradicate malicious activity
Conduct proactive threat research using real-world security data and systems automation
Cerințe
A college degree or equivalent experience in cyber security
Verbal communications skills and concise written communication skills
Business savvy and an eye for detail with timely execution
Able to deal with high priority, time-sensitive issues
Ability to multitask and switch between multiple high priority projects
Organisation and multi-tasking skills
A solid grasp and experience assessing vulnerabilities and identifying weaknesses in variousoperating systems, platforms, databases, servers, etc
Understanding of the current threat and vulnerability landscape
Experience with and understanding of database systems, web servers, application servers,firewalls, routers, load balancers, switches, etc
Understanding of Application Security and the OWASP top 10 principles
Experience with enterprise endpoint detection tools
Dependability: Meet commitments, work independently, accept accountability, be adaptableto change, set personal standards
Ability to effectively report trends regular reporting
An Understanding of industry standard methodologies in application & operations security
Knowledge of emerging threats, mitigations and industry trends
Solid grasp of Windows and Linux operating systems
Other Beneficial Qualifications
Demonstrated ability in testing proof of concept exploits to identify potential vulnerabilities• Proficient in scripting(any): Python, Ruby, Pearl, PowerShell
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.