Cyber Security Analyst Information Technology (IT) - Minneapolis, MN at Geebo

Cyber Security Analyst

3.
8 Maple Grove, MN Maple Grove, MN Full-time Full-time Estimated:
$83.
2K - $105K a year Estimated:
$83.
2K - $105K a year 3 days ago 3 days ago 3 days ago Overview:
Role Purpose The purpose of this role is to analyse, identify, rectify &recommend specific improvement measures that help in the securityposture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing aptcybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any securitybreaches Monitor for attacks, intrusions and unusual, unauthorized orillegal activity Performs moderately complex log reviews and forensic analysis toidentify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root causeanalysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotationalshifts Use advanced analytics tools to determine emerging threatpatterns and vulnerabilities Completing all tactical security operations tasks associatedwith this engagement.
Analyses all the attacks and come up with remedial attackanalysis Conduct detailed analysis of incidents and create reports anddashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issuesand provide future recommendations Maintain an information security risk register and assist withinternal and external audits relating to information security Assist with the creation, maintenance and delivery of cybersecurity awareness training for colleagues Advice and guidance to employees on issues such as spam andunwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Technical Lead/ Project Lead Regular reporting & updates Security Intelligence (Practice) Coordination for security reasons External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively:
Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming technology(automation, tools and systems) to build efficiencies and effectivenessin own function/ Client organization - Expert Process Excellence - Ability to follow the standards and norms toproduce consistent results, provide effective control and reduction ofrisk - Expert Functional/Technical - Knowledge of Network Security devices,firewalls, end points, SIEM, application security, IPS/IDS, VA / PTskills - Master Competency Levels Foundation Knowledgeable about the competency requirements.
Demonstrates (inparts) frequently with minimal support and guidance.
Competent Consistently demonstrates the full range of the competencywithout guidance.
Extends the competency to difficult and unknownsituations as well.
Expert Applies the competency in all situations and is serves as a guideto others as well.
Master Coaches others and builds organizational capability in thecompetency area.
Serves as a key resource for that competency and isrecognized within the entire organization.
Behavioral Competencies Effective Communication Collaborative Working Execution Excellence Problem Solving & Analytical Skills Deliver No.
Performance Parameter Measure 1.
Customer centricity Timely security breach solutioning to end users,Internal stakeholders & external customers experience 2.
Process Adherence Adherence to SLA's (90-95%), response time and resolutiontime TAT.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.