|Date Posted||January 10, 2019|
Computer & IT
IT SECURITY ANALYST
The role is composed of a variety of activities, including tactical, operational and strategic activities in support of IT and security program initiatives, such as:
a) Manage and Maintain Information Security Solution e.g. SIEM, IDP, ATP, Firewall, Endpoint, Patch Management, Data Classification
b) Analyse, Monitor, Review and Correlate Log of Server, Network and Security Device Monitor Incident Management
c) Proactively Report, Resolve and Remediation of any Information Security incident or violation Conduct Information Technology Risk Assessment
d) Maintain Information Security System Document
e) Provide consultation or guidance of Information Security to other Business Unit
f) Supervise IT Operation Helpdesk (2nd tier helpdesk) to provide general technical support for end user
g) Perform Compliance Monitoring of Information Security Asset and Information Security Activities
h) Work with IT and security on projects that address identified risks and business security requirements.
i) Monitor and report on compliance with security policies, as well as, the enforcement of policies within the IT department.
j) Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance.
k) Provide leadership and coaching for IT and security team members
l) Assist resource owners and IT staff in understanding and responding to security audit failures reported by auditors.
m) Work as a liaison with vendors and the legal and purchasing departments to establish mutually acceptable contracts and service-level agreements.
n) Manage production issues and incidents, and participate in problem and change management forums.
o) Serve as an active and consistent participant in the information security governance process.
p) Provide support and guidance for legal and regulatory compliance efforts, including audit support.
q) Measure and report on the technical aspects of security management.
r) Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements.
s) Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk.
t) Manage security projects and provide expert guidance on security matters for other IT projects.
u) Assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans.
v) Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements.
w) Design, coordinate and oversee security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks.
This role will be responsible for working with business and IT stakeholders to balance risks with business drivers such as speed, agility, flexibility and performance. The role will provide guidance to IT personnel for managing technical security infrastructure in a secure manner through threat assessments.