We are seeking a highly skilled and detail-oriented Information Security Analyst on behalf of our client to monitor, assess, and enhance their security posture. In this role, you will be responsible for analyzing security incidents, assessing vulnerabilities, and ensuring compliance with security policies. You will play a critical role in developing and implementing security measures, responding to breaches, and documenting security incidents to strengthen their overall cybersecurity framework. Your expertise will help safeguard their information systems and mitigate potential risks.
Key Responsibilities:
* Monitor and analyze security incidents to protect the organization’s information systems.
* Assess vulnerabilities, identify risks, and respond to security breaches in a timely manner.
* Develop and implement security measures and best practices to enhance system protection.
* Ensure compliance with security policies, regulatory requirements, and industry standards.
* Prepare detailed reports documenting security breaches, incidents, and risk assessments.
* Work closely with IT and security teams to enhance security protocols and mitigate threats.
* Utilize intrusion detection systems, data loss prevention tools, and other security technologies.
* Stay up to date with emerging security threats, technologies, and industry trends.
* Provide security awareness training and guidance to employees.
Requirements:
* Bachelor's degree in Information Security, Computer Science, Cybersecurity, or a related field.
* Experience working with intrusion detection systems (IDS), firewalls, and data loss prevention tools.
* Strong analytical and problem-solving skills with the ability to assess complex security issues.
* Familiarity with security frameworks and compliance standards (e.g., NIST, ISO 27001, GDPR).
* Hands-on experience in security incident response, threat analysis, and vulnerability assessment.
* Ability to work in an Agile environment and collaborate effectively with IT and security teams.
* Relevant certifications such as CEH (Certified Ethical Hacker), CompTIA Security+, or CISSP are advantageous.
#J-18808-Ljbffr