As a member of the Information Security team, the Cybersecurity Analyst shoulders the responsibility of safeguarding the company against intrusions, malware, threat actors, and assorted cyber threats. The role involves actively supporting initiatives to automate, integrate, and consolidate data and systems for enhanced analysis efficiency.
Key Responsibilities
- Investigates emerging threats and vulnerabilities to aid in identifying network incidents and contribute to crafting new architecture, policies, standards, and guidelines to address them.
- Provides incident response support, including implementing measures to contain activities and facilitating forensic analysis when required.
- Assists in developing business continuity and disaster recovery plans, including conducting tests, reporting results, and implementing necessary changes to rectify deficiencies.
- Engages in network monitoring and intrusion detection analysis utilizing various computer network defense tools such as intrusion detection/prevention systems (IDS/IPS), firewalls, and host-based security systems (HBSS).
- Review alerts and data from sensors, compiling formal technical incident reports.
- Conducts testing of new computers, software, switch hardware, and routers to ensure security prior to implementation.
- Executes log-based and endpoint-based threat detection to counter threats originating from diverse sources.
- Implements cloud-centric detection methods to identify threats associated with cloud environments and services utilized by the organization.
- Correlates activity across assets and environments to detect patterns of anomalous behavior.
- Collaborates with threat intelligence and/or threat-hunting teams.
- Conducts ongoing research into emerging threats and vulnerabilities to enhance incident identification capabilities.
Requirements
- Preferred Bachelor's degree in computer science, engineering, information systems, or a related field.
- Five or more years of experience in information security, particularly in a network security analyst capacity.
- Desirable certifications include Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM).
- Technical proficiency in analyzing threat event data, evaluating malicious activity, documenting unusual files and data, and identifying attacker tactics, techniques, and procedures.
- Understanding of business requirements and dedication to delivering high-quality, timely, and efficient service.
- Strong decision-making skills, with a demonstrated ability to assess the costs and benefits of actions and determine the most suitable course.
- Familiarity with organizational mission, values, and goals, consistently applied in practice.
- Excellent problem-solving and troubleshooting abilities.
- Self-motivated with a strong sense of urgency and personal integrity.