Monitor for attacks, intrusions and unusual, unauthorized, or illegal activity
Monitor identity and access management, including monitoring for abuse of permissions by authorized system users
Produce and maintain a Security Incident Log that is a reflective of security events or incidents that occurred within the organization
Investigate security alerts providing incident response and first level computer forensic activities
Use advanced analytic tools to determine emerging threat patterns and vulnerabilities
Engage in ethical hacking, for example, simulating security breaches
Keep up to date with the latest security and technology developments including researching and evaluating emerging cyber security threats and ways to manage them
Liaise with stakeholders in relation to cyber security issues and provide future recommendations
Generate reports for both technical and non-technical staff and stakeholders
Maintain an Information Security risk register and assist with internal and external audits relating to information security
Assist with the creation, maintenance, and delivery of cyber security awareness training for colleagues
Take a lead role in the handling or all information requests and audits
Take a lead role the design and execution of vulnerability assessments, penetration tests and security audits
Take a lead role in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) without the Digital and IT domain
Take a lead role in the backlog management of Policy Control Implementation
Maintain up-to-date baselines for the secure configuration and operations
Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors
Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security
Participate in the planning and design of enterprise security architecture
Participate in the annual reviews and updates of the enterprise Business Continuity Plan and Disaster Recovery Plan
Provide on-call support for end users for all in-place security solutions
Assess security controls and evaluate security posture of organizational internal controls
Evaluate third party relationships for compliance to organization security standards
Maintain confidentiality on all sensitive security matters
Maintain standards and procedures that meet operational, regulatory, and company policies
Drive continued standardization and consolidation to cloud-first technologies ensuring consistent backup system availability and capabilities
Participate in engineering phases for security including planning, design, build, testing, and transition to operational support
Identify and drive continuous improvement initiates
Work closely with various internal teams and auditors to generate timely audit reports
Create reports and KPIs related to all areas of Information Security
Apply a consistently positive, problem-solving attitude and demonstrate a curious mindset
Provide mentorship and guidance to junior team members.
Support the development of operational excellence via process, technology, and people development
SKILLS QUALIFICATIONS:
7+ years of progressive experience as Information/Cyber Security Analyst
3+ years of advanced SIEM Platforms
Proficient, or able to gain proficiency with, a broad array of security software applications and tools
Thorough understanding of computer-related security systems including firewalls, encryption, and password protection and authentication
Expert knowledge of computer-related security systems principles and practice
Significant experience using Kusto Query Language (KQL) to query SIEM
Significant experience using PowerShell to automate common tasks
Problem-solving and analytical abilities including the ability to critically evaluate information gathered from multiple sources, reconcile conflicts, decompose high-level information into details and apply sound business knowledge
Expertise in documenting requirements, establishing scope and objectives, and determining the strategy for implementing systems to achieve business goals
Excellent interpersonal, verbal, and written communication skills
Ability to multi-task and work independently, as well as work collaboratively with teams, some of which may be geographically distributed