IT Security Analyst
Job Overview
- Company Name Intertek
- Job Start Date Fri, 14 Jan 2022 05:33:05 GMT
- Job Type Full Time - Permanent
- Job Source Careerjet
Job title: IT Security Analyst
Job description: IT Security Operations Analyst
1. General Description of Responsibilities
1. Through guidance provided by the Director of Operations, the Senior Threat Analyst and Operations Technical Leads, in a timely, legal and ethical manner, the Operations Analyst will develop informational products for the information sharing communities, review IDS alerts and review ASV scan reports.
2. Threat Analysis and Information Sharing Specific Responsibilities
1. Proactively conduct information sharing for various information sharing communities under technical guidance from the Senior Threat Analyst;
2. Be actively involved in the production of all information products by conducting research, analysis and the development of various reports for the various communities we support. The Operations Analyst will work with the Senior Threat Analyst to identify appropriate content for a number of different types of reports.
3. Act as Help desk analyst by being available during the assigned help desk shift to respond to e-mail and telephone assistance requests from members of the information sharing communities.
4. Contribute to discussions with all team members to develop future directions and products for the information sharing communities.
5. Contribute to the development, deployment and maintenance of the operations lab environment and the systems within it. The operations lab is designed to be used by analysts to assist them with their research and analysis of cyber threat informational topics for the development of reports.
6. Acting as an EWA-Canada representative in information sharing community user groups.
7. Attending and participating in information sharing related conferences and face to face sessions.
8. At times assist the Senior Threat Analyst with some mentoring of Junior Operations Analysts in training and quality assurance of their work products.
3. IDS Specific Responsibilities
1. Conduct, as assigned, analysis or quality assurance review of IDS incidents and alarms using EWA-Canada deployed IDS management systems. The Operations Analyst will immediately raise any high priority incident, when identified, to the IDS Technical Lead, and if appropriate to the Computer Support Coordinator and the Director of Operations.
4. Approved Scanning Vendor Specific Responsibilities
1. Conduct, as assigned, analysis and review of ASV submitted scan reports to the current ASV baseline. This analysis will be documented using the ASV report application.
5. General Responsibilities
1. Act as a EWA-Canada Duty Officer as scheduled to provide 24×7 on call support to EWA-Canada Computer Support and operational clients. When scheduled for a duty officer shift, the Operations analyst will be provided a cellular phone and laptop computer. The duty officer is responsible for monitoring the cellular phone for alerts and responding to them as required. The specific procedures and responsibilities are documented in the Duty Officer Handbook.
2. Other duties related to the above, as assigned
3. Carrying out all responsibilities in a supportive manner with total adherence to: The Company’s Health, Safety and Environmental Policies and Procedures, Quality Management System, Compliance and Ethics Policies, Vision, Mission and Strategy, and exercises good judgment, common sense, and diplomacy.
6. Supervision Exercised
1. None
7. Supervision Received
1. The Operations Analyst reports directly to the Director of Operation.
8. Education and Experience Requirements
1. The Operations Analyst requires any post-secondary education or apprenticeship;
2. Experience minimally will include two years’ experience in cyber threat information sharing.
3. Maintain an active IT Security related professional certification.
4. Maintain an active Government of Canada Secret level security clearance.
5. Good knowledge of cyber threat information sharing and all of the products developed for the information sharing communities.
6. Good knowledge of the Celerium Mission Center portal and Soltra Edge Software platforms.
7. Experience with cyber threat analysis and sharing platforms deployed in the operations lab including, but not limited to:
1. Cuckoo sandbox
2. Elastic search / kibana
3. MISP
8. Experience and understanding of threats and threat actors, risks and vulnerabilities
9. Understanding of cyber attack methods, tools and techniques and incident classifications
10. Experience and understanding of network traffic and
…
protocols as well as protocol analyzers and snort IDS events.
11. Excellent understanding of IDS events and incidents and the ability to identify real incidents from false positives.
12. Exper…
Source:
