0% found this document useful (0 votes)
110 views

Information Security Analyst (Level 2) Key Objectives

The document describes the responsibilities of an Information Security Analyst Level 2 position. The role involves managing the deployment and support of a customer's security information and event management (SIEM) solution. Key responsibilities include providing technical support, investigating and diagnosing security incidents, and ensuring documentation and processes are followed. The position requires a bachelor's degree in information systems or equivalent experience, as well as knowledge of network security systems, logging policies, and security management.

Uploaded by

sathish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views

Information Security Analyst (Level 2) Key Objectives

The document describes the responsibilities of an Information Security Analyst Level 2 position. The role involves managing the deployment and support of a customer's security information and event management (SIEM) solution. Key responsibilities include providing technical support, investigating and diagnosing security incidents, and ensuring documentation and processes are followed. The position requires a bachelor's degree in information systems or equivalent experience, as well as knowledge of network security systems, logging policies, and security management.

Uploaded by

sathish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Information Security Analyst (Level 2) Key Objectives

The Information Security Analyst will manage the end-to-end operational deployment, verification, incident handling and
support of our Customers' remote managed EventTracker SIEM solution. This is a technical operational role focused on
delivering quality service to our customers.

Responsibilities
 Provide operational and technical support to our Customers. (note, candidates will receive training on all
EventTracker tool sets)
 Serve as shift leader and point of escalation for level 1 analysts.
 Oversee completion of day-to-day checklist(s), including: log review, management report scheduling & running, alert
analysis, and escalation follow up activity status
 Manage security incident investigation and diagnosis (performs triage on incidents which are reported by the
EventTracker SIEM tool to filter out false positives and known accepted activities)
 Validate incident containment and remediation recommendations provided to Customers.
 Ensure all unresolvable cases are passed to the correct team for action as appropriate
Analysts Duties
 Ensure high level of quality when managing tickets, requests and Customer queries
 Execute Customer on-boarding
 Capture requirements and prepare Customer EventTracker SIEM filter & tuning requests
 Prepare reports & distribute in readiness for Customer tuning calls
 Arrange & manage client calls (record outputs/actions appropriately)
 Create scheduled Customer reporting, from existing reports, where appropriate
 Maintain technical knowledge, tool proficiency, and system accesses, which allow you to perform the role
 Ensure documentation is maintained appropriately on Sharepoint & new documents are created/stored correctly
 Engage with Customers to build and maintain good, professional relationships
 Manage operational relationships with all relevant parties
Note
 Responsible for the application of IT Security Policy, processes & procedures to mitigate risks to our Customers
 May be required to provide on call emergency support if required by the business.

Requirements
 Bachelor's degree in information systems or 2 year equivalent work experience in Network Security Systems &
Operations.
 Qualified to degree level, or equivalent professional experience and/or with recognized technical/security
qualifications.
 Relevant experience and understanding of Network Security Systems & Operations
 Understanding of system logging including both Security and non-security logs
 General knowledge of Linux/Unix and Microsoft Security Logging Policies
 General knowledge of Network Application Logs Especially Proxies, Web Application Firewalls, and Stateful Firewalls
 General knowledge of Syslog, SNMP, WMI and the benefits and limitations of each
 Knowledge of Security management, network and information security, and end user security.
 User level experience with UNIX/Linux systems
 Experience supporting one or more services within a Security Operations Center is a plus

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy