SUMMARY
The Security Analyst performs two core functions for the enterprise. The first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation and resolution of security breaches detected by those systems. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines and procedures as well as conducting vulnerability audits and assessments. The IT Security Analyst is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures and guidelines and to actively work towards upholding those goals.
ESSENTIAL DUTIES AND RESPONSIBILITES
Perform routine maintenance and monitoring of all security systems.
Assist in developing end-user security training.
Participate in the planning and design of enterprise security architecture.
Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures).
Participate in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan.
Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.
Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
Assist in the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.
Maintain operational configurations of all in-place security solutions as per the established baselines.
Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution.
Participate in investigations into problematic activity.
Participate in the execution of vulnerability assessments, penetration tests and security audits.
Provide on-call support for end users for all in-place security solutions. #ind1
|