Security Analyst
-
Other
Job Description
Drive security
implementation within desired timelines.
• Participate in implementation of information security
monitoring and reporting.
• Serve as initial escalation point for information security
team, providing outstanding customer service through timely, high quality issue
resolution.
• Implementing SSO, IDS/IPS, log management, and related
network security infrastructure and services.
• Triaging DLP alerts for sensitive and unapproved data
leakage.
• Responsible for ensuring, proper documentation and
evidence retention appropriately relating to data loss.
• Create and manage existing rules on loss prevention and
web content filtering solution to mitigate business and information risk
• Perform spot audit to assess the effectiveness of
implemented control and identify gaps in operational and technical process
against organizational process and standard industry practice.
• Working knowledge of IT technologies including Routing
switching, WLAN, Radius, Firewalls, SSO/SAML, Identity Access Management
and Microsoft Technologies (Active Directory, IIS, ISA, DNS)
• Basic knowledge of information security frameworks and
industry regulations (NIST, ISO 27001, CoBIT, PCI, SOX).
implementation within desired timelines.
• Participate in implementation of information security
monitoring and reporting.
• Serve as initial escalation point for information security
team, providing outstanding customer service through timely, high quality issue
resolution.
• Implementing SSO, IDS/IPS, log management, and related
network security infrastructure and services.
• Triaging DLP alerts for sensitive and unapproved data
leakage.
• Responsible for ensuring, proper documentation and
evidence retention appropriately relating to data loss.
• Create and manage existing rules on loss prevention and
web content filtering solution to mitigate business and information risk
• Perform spot audit to assess the effectiveness of
implemented control and identify gaps in operational and technical process
against organizational process and standard industry practice.
• Working knowledge of IT technologies including Routing
switching, WLAN, Radius, Firewalls, SSO/SAML, Identity Access Management
and Microsoft Technologies (Active Directory, IIS, ISA, DNS)
• Basic knowledge of information security frameworks and
industry regulations (NIST, ISO 27001, CoBIT, PCI, SOX).