Quantcast
Viewing all articles
Browse latest Browse all 33439

information security analyst banking (Snort/IDS)

Snort / Source fire / IDS/ Intrusion Detection Systems

The Information Security Analyst role reports to the Information Security Manager working
within a small team of information security analysts within the Information Technology
team. The role holder will be in IT security specialist with a detailed understanding and
experience operating technical security controls. They will be part of team that provide;
strong analytical skills; technical risk, threat and vulnerability management; experienced in
the selection and implementation of appropriate controls; and experienced in conducting
structured vulnerability assessments and incident response.

KEY RESPONSIBILITIES

Undertake daily operational monitoring activities over of the security infrastructure, to
maintain awareness of the operational status of infrastructure. Undertake management
and development of security infrastructure and technologies. Act as the primary contact
point for 3rd line support on a number of systems. Undertaking technical information
security incident response, investigations, gathering and analysing data, writing up the
findings and making recommendations aligned with industry practise best for information
security. Undertake reviews of the build and configuration of infrastructure component,
report on findings and make recommendations. Undertake technical infrastructure and application vulnerability assessments and penetration tests, report on findings and make
recommendations. Undertake business-as-usual information security operational, ongoing
monitoring and oversight activities. Analyse and correlate log data. Providing expertise on
information security activities embedded within business and technical project teams.
Undertake risk assessments on third party operational and security controls, document
findings and make recommendations aligned with business requirements and industry
good practise. Undertake reviews of new systems and business requirements to ensure
conformity with information security policies and standards. Provide oversight technical
and administrative access controls. Develop and maintain operational documentation and
procedures aligned to good practice. Conduct audits on technical and administrative
controls.

TECHNICAL SKILLS

SIEM Management,
Configuration and operation IDS Configuration, Tuning, Operation Web filtering
technologies Firewall Configuration, Operations and Management VMware ESXi Antivirus
Cisco IOS Infrastructure and Application Penetration Testing Forensic Analysis Consultancy
and analysis skills. Technical Risk Assessments. Strong audit and analytical skills. Process
and procedure development. Impact Assessments. Strong written and verbal
communication skills. Knowledgeable of the relevant data security legislation and FSA
regulation.

KEY COMPETENCIES
Competency Definition Personal Ethics Act honourably,
honestly, justly, responsibly, and legally, at all times. Business Awareness Maintains a
broad knowledge of the financial sector and the market, understands the business
environment and their role within it. Information Systems Accepts personal responsibility
for developing their information security awareness and capability. Organisation & Planning
Prioritises and plans to make the good use of resources to deliver tasks within timescales.
Organised and well structured. Achievement and Drive Self motivated and able to work on
own or as part of a team. Passionate about information security. Embraces change.
Decision Making Demonstrates good judgement. Analyses, evaluates and interprets
information to reach an effective decision. Operational Knowledge Accepts personal
responsibility for developing own operational knowledge and skills to improve
effectiveness. Customer Focus Consistently delivers a high level of service and takes pride
in meeting end users requirements. Effective Communication Communicates effectively,
clearly and appropriately by using a range of styles to engage the required audience.
Handles objections well and can adapt arguments to be presented differently when
challenged.Image may be NSFW.
Clik here to view.

Viewing all articles
Browse latest Browse all 33439

Trending Articles