Role Overview
Our client, a global manufacturing firm, is looking to improve and enhance their internal approach to managing 3rd party SOC alerts generated by Sentinel managed SIEM and from their existing tool base: Netskope, Darktrace, SentinelOne, and Tenable. We are seeking an analyst who can be hands-on to tune the technologies, help remediate alerts, and develop internal processes.
Role Requirements
* The Cyber and Information Security Analyst is responsible for triaging information from external/internal sources and actioning upon the information.
* The person will have excellent communication skills and the ability to influence at all levels.
* The individual will own the risks from start to finish and be responsible for investigating and closing risks.
* Will have hands-on experience with Netskope, Darktrace, and Sentinel.
* Provide policy guidance in security models, software, tools, and standards (e.g., NIST, ISO27001/5).
* Development of tools and techniques to test for cyber vulnerabilities and exploits.
* Work with all suppliers, contractors, and consultants to maintain and enhance information security and cyber resilience.
* Identify cyber risks specific to information systems and produce remediation action plans.
* Stay abreast of industry security trends and developments, as well as applicable government regulations.
* Contribute to the advancement of organizational cyber resilience through solutions that allow for secure but convenient access to information, complying with best practices and any regulatory mandates. Solutions include, for example, identity and access management, threat and vulnerability management, mobile security, and encryption technologies.
Certifications that could be of benefit
* ITIL Foundation
* CompTIA CySA+
* CompTIA Security+
* Certified Ethical Hacking
* CISMP
#J-18808-Ljbffr