Technical/Functional Skills
We are seeking an experienced Level 3 Security Analyst to join our IT Security team. The ideal candidate will have deep expertise in managing and optimizing advanced network security tools including CyberVision, StealthWatch, and Identity Services Engine (ISE) for Network Access Control (NAC). This role involves overseeing the security infrastructure, ensuring the integrity and availability of our network resources, and responding to complex security incidents.
Roles & Responsibilities
Tool Management:
Administer and configure CyberVision, StealthWatch, and ISE tools to ensure optimal performance and security posture. Regularly update and maintain the tools to support evolving security requirements and best practices.
Incident Response:
Lead the response to high-priority security incidents involving network access and security tools. Conduct thorough investigations, including analyzing logs, identifying vulnerabilities, and coordinating with other teams to resolve issues.
Security Monitoring:
Monitor network traffic and access patterns using StealthWatch and CyberVision to detect and respond to potential threats. Utilize ISE for real-time network access control, ensuring compliance with security policies and access controls.
Optimization and Tuning:
Continuously assess and optimize the performance and configuration of CyberVision, StealthWatch, and ISE tools. Implement improvements and fine-tune settings to enhance detection capabilities and reduce false positives.
Documentation and Reporting:
Develop and maintain comprehensive documentation related to tool configurations, security incidents, and response procedures. Prepare detailed reports and presentations for senior management on security posture, incidents, and tool performance.
Collaboration:
Work closely with other IT and security teams to integrate NAC solutions with broader security strategies and technologies. Provide guidance and training to junior analysts and other team members on the use of security tools and incident response procedures.
Compliance and Best Practices:
Ensure that network security practices adhere to regulatory requirements and industry standards. Stay updated on the latest security trends and tool developments to ensure the organization’s practices remain cutting-edge.
Education
Graduate/ PG, Information security or related field. Relevant Certifications (e.g., CISSP, CISM, CCNP Security) are highly desirable