The IT Security Analyst is a hands-on technical professional responsible for monitoring, detecting and responding to security threats, conducting vulnerability assessments, and ensuring compliance with security policies. The Security Analyst is involved in data gathering, security testing, threat mitigation and remediation, along with user training while maintaining a strong understanding of the technology, the systems and the business processes it supports.
Responsibilities:
- Alert triage, mitigation and management
- Triage, mitigate and remediate alerts in various dashboards and alerting engines
- Communicate and/or escalate events that have a major impact on the organization's security structure, compliance or assets
- Data Analysis and information Gathering:
- Collect and correlated security and system event data and logs to identify abnormal behaviors or threats
- Assist in the data gathering and Analysis of existing systems, process and procedures and identify opportunities for improvement in alignment with organizational goals.
- Vulnerability monitoring:
- Monitor various vulnerabilities feeds and determine vulnerabilities that impact our systems, processes or assets
- Monitor vulnerability management platforms and services to identify current and known vulnerabilities and ensure effective mitigation or remediation in accordance with our defined approach and policy
- Identify trends or issues in mitigation or remediation measure and communicate to appropriate stakeholders
- User Support and Training:
- Provide direct support to end-users, addressing escalated technical issues and promoting best practices.
- Design and deliver technical training sessions to enhance user competency and adoption of IT solutions and security practices.
- Conduct training activities and attack simulations to enhance the end user exposure and knowledge regarding threats
- Process Improvement and Technical Leadership:
- Research and recommend technology changes to meet evolving business needs.
- Assist in the planning and execution of new technology implementations, including process mapping, enterprise architecture, testing, and deployment.
- Documentation and Security:
- Maintain clear and detailed documentation of systems, processes, and technical configurations.
- Implement and audit system security practices to ensure compliance with organizational policies and best practices.