Requirements: Minimum of two years of IT or network security experience and Bachelor's degree in information systems, or equivalent work experience.
Perform threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure systems are protected from known and potential threats and are free from known vulnerabilities.
Investigate and track Intrusion Detection System alarms
Investigate SIEM alarms of suspicious activities in user accounts, etc.
Help design and build new SIEM alerts, reports and dashboards
Study network traffic patterns to identify anomalies
Review installed software reports for unauthorized or malicious software on workstations
Collate security incident and event data to produce monthly exception and management reports.
Help maintain Information Security Management System to maintain ISO 27001 Certification and regulatory compliance and client requirements
Monitor system logs, SIEM tools and network traffic for unusual or suspicious activity. Interpret such activity and make recommendations for resolution.
Respond to and, where appropriate, resolve or escalate reported security incidents.
Investigate and resolve security violations by providing postmortem analysis to illuminate the issues and possible solutions.
Report unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes.
Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management.
Experience in developing, documenting and maintaining security procedures.
Knowledge of network infrastructure, including routers, switches, firewalls, and associated network protocols and concepts.
Strong analytical and problem-solving skills to enable effective security incident and problem resolution.
Ability to work well under minimal supervision.
Strong written and verbal communication skills.
Strong customer/client focus, with the ability to manage expectations appropriately, provide a superior customer/client experience and build long-term relationships.
Experience with information security controls and related technologies such as intrusion detection systems, vulnerability scanning systems, authentication systems, Windows systems, and various security tools is preferred.
Additional qualifications include experience analyzing raw security data, investigative skills, ability to work effectively in a team-oriented IT environment, and the ability to work independently and on multiple projects.