Make sure you’re applying to a legit company by checking their website and job posts.
Job description IT Security Analyst (Information Security Department) [NIE] National Institute Of Education
- Respond to escalated incidents and perform deep analysis and correlate with threat intelligence to identify the threat actor, nature of the attack and systems or data affected.
- Establish, maintain and execute all components of the incident response plan, from incident intake through root cause analysis, technical remediation analysis, and reporting.
- Prioritise alerts or issues and performs triage to confirm a real security incident is taking place.
- Decide on the strategy for containment, remediation and recovery and acts on it, through conducting forensic and root cause analysis, including events based on sparse symptom detail.
- Contextualise security events within the network environment and coordinates the response activities with key staff in real-time.
- Review day-to-day alerts, industry news, threat intelligence and security data.
- Actively hunt for cyber threats that have found their way into the network, as well as unknown vulnerabilities and security gaps.
- Understand data structures and transform, analyse and visualise them to uncover cyber-attack patterns or derive meaningful insights from various sources (E.g. From private feeds, open-source data, network logs, etc.)
- Leverage on security tools to pivot from threat intelligence into enterprise data, to produce analytics and detect new or stealthy attacks.
- Enhance existing SOC processes and perform reviews to optimise existing workflows and operations within the SOC, in alignment with the business requirements and long-term strategy and planning.
- Collaborate with various IT teams in evaluating, procuring and deploying new IT security solutions.
- Bachelor’s Degree in Computer Science/Information Security or equivalent with at least eight years of progressive experience in IT security (IT infrastructure and applications) or security operation centre.
- Strong technical skills (E.g. ability to code and script; knowledge and usage of regular expressions; etc.). Experience in developing detection use cases for a variety of log types for Splunk (E.g. Security Events, Firewall).
- Experience leading and driving the investigation of complex security incidents, with strong analytical and problem-solving skills, to analyse the root-causes.
- Experience in performing digital forensics.
- Knowledge of industry standards and information security policy and frameworks.
- The possession of professional certifications such as GCIA, OSCP or Splunk would be an advantage.
- Health and wellness benefits
- Parental/family leave
- Medical coverage
- Personal development benefits
- Team building events