Posted:1 week ago|
Platform:
On-site
Full Time
The IT Security Analyst performs two core functions for BPM. The first is the day-to-day operations of the in-place security solutions, while the second is identifying, investigating, and resolving security breaches detected by those systems. Secondary tasks may include involvement in implementing new security solutions, participation in creating and maintaining policies, standards, baselines, guidelines, and procedures, assisting with E-Discovery, and conducting vulnerability audits and assessments. The IT Security Analyst is expected to be fully aware of the enterprise s security goals as established by its stated policies, procedures, and guidelines and to work to uphold those goals. Responsibilities: Strategy & Planning Participate in the planning and design of enterprise security architecture under the direction of the IT Security Manager, where appropriate. Participate in creating and maintaining enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate. Acquisition & Deployment Maintain up-to-date detailed knowledge of the IT security industry, including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors. Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security. Perform the deployment, integration, and initial configuration of all new security solutions and any enhancements to existing security solutions following standard best operating procedures generically and the enterprise s security documents specifically. Operational Management Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether under direct control (i.e., security tools) or not (e.g., workstations, servers, network devices). Maintain operational configurations of all in-place security solutions per the established baselines. Monitor all in-place security solutions for efficient and appropriate operations. Review logs and reports of all in-place devices, whether they are under direct control (i.e., security tools (Microsoft Sentinel, Defender, etc.)) or not (e.g., workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution. Participate in investigations into problematic activity. Participate in E-Discovery projects. Participate in the design and execution of vulnerability assessments, penetration tests, and security audits. Participate in application and vendor reviews which involve assessing risks, compliance with security requirements, verifying adherence to regulatory standards and organizational security policies. Provide on-call support for end users for all in-place security solutions. Position Requirements: Formal Education & Certification College diploma or university degree in Computer Science and/or two years equivalent work experience. One or more of the following certifications: CompTIA Security+ GIAC Information Security Fundamentals Microsoft Certified Systems Administrator: Security Associate of (ISC)2 Knowledge & Experience Extensive experience working in a SOC environment responding to incidents and breaches. Experience with firewalls, intrusion detection systems, anti-virus software, data encryption, and other industry-standard techniques and practices. Experience in E-Discovery, including content searches and relevant procedures and practices. Experience with current systems software, protocols, and standards. Working technical knowledge of network, PC, and platform operating systems Strong understanding of IP, TCP/IP, and other network administration protocols. Strong understanding of applicable practices and laws relating to data privacy and protection. Familiarity with switches, routers, and Firewalls. Personal Attributes: Proven analytical and problem-solving abilities. Ability to effectively prioritize and execute tasks in a high-pressure environment. Good written, oral, and interpersonal communication skills. Ability to conduct research into IT security issues and products as required. Ability to present ideas in business-friendly and user-friendly language. Highly self-motivated and directed. Keen attention to detail. Team-oriented and skilled in working within a collaborative environment.
Burr Pilger Mayer
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Bengaluru / Bangalore, Karnataka, India
2.0 - 5.0 Lacs P.A.
5.0 - 9.0 Lacs P.A.
5.0 - 7.0 Lacs P.A.
Hyderabad
6.0 - 13.0 Lacs P.A.
Pune
20.0 - 30.0 Lacs P.A.
Ghaziabad
3.0 - 5.5 Lacs P.A.
Bengaluru
6.0 - 8.0 Lacs P.A.
Chandigarh
Salary: Not disclosed
12.0 - 22.0 Lacs P.A.
3.0 - 5.0 Lacs P.A.