Text copied to clipboard!

Title

Text copied to clipboard!

Information Security Analyst

Description

Text copied to clipboard!
We are looking for a dedicated Information Security Analyst to join our team. The successful candidate will be responsible for planning and implementing security measures to protect our computer systems, networks, and data. The Information Security Analyst is expected to stay up-to-date on the latest intelligence, including hackers’ methodologies, in order to anticipate security breaches. They are also responsible for preventing data loss and service interruptions by researching new technologies that will effectively protect a network. This role requires a high level of technical expertise and attention to detail. A strong understanding of the business and an excellent ability to communicate and implement the necessary technical security controls are also required.

Responsibilities

Text copied to clipboard!
  • Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information.
  • Ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.
  • Respond to computer security breaches and viruses.
  • Test and evaluate security products.
  • Design secure network architectures.
  • Develop information security plans and policies.
  • Implement protection measures.
  • Monitor for security breaches and handle incidents.
  • Investigate intrusion incidents and conduct forensic investigations.
  • Develop strategies to handle security incidents and coordinate incident response activities.

Requirements

Text copied to clipboard!
  • Bachelor's degree in Computer Science or related field.
  • Experience in information security or related field.
  • Experience with computer network penetration testing and techniques.
  • Understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts.
  • Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
  • Understanding of patch management with the ability to deploy patches in a timely manner.
  • Experience with Identity and Access Management principles.
  • Ability to read and use the results of mobile code, malicious code, and anti-virus software.
  • Strong understanding of endpoint security solutions to include File Integrity Monitoring and Data Loss Prevention.
  • Adequate professional experience and knowledge to perform Job Responsibilities.

Potential interview questions

Text copied to clipboard!
  • What is your experience with designing secure network architectures?
  • Can you describe a time when you successfully identified and mitigated a network vulnerability?
  • How do you stay updated on the latest intelligence, including hackers’ methodologies?
  • Can you explain your experience with Identity and Access Management principles?
  • How do you handle security incidents and coordinate incident response activities?