Security Analyst - Collins McNicholas

advertisement
Security Analyst
Security analyst will ensure the daily operations of monitoring and review within an infosec environment are
conducted.
Essential Functions:








Provide IDS monitoring, log analysis and incident response to information security alerts. Analyze log
files, network traffic and IDS alerts to assess, prioritize and differentiate between potential intrusion
attempts and false alarms.
Launch and track investigations to resolution. Advise in the steps to take to investigate and resolve
computer security incidents. Recommend IDS filters to eliminate false positives. In addition, daily
reviews of IT security news postings reporting exploits in the wild and potential zero-day exploits.
Perform highly complex analysis and technical tasks involving event detection and rapid response
across various environments of the enterprise
Design, implement and support integration of information security solutions including security
architectures, firewall administration, integrating security products, and developing and coordinating
security implementation plans
Work with senior management to determine acceptable levels of risk for enterprise computing platforms
and to discuss security implications of new information technology uses being considered
Review and contribute to the improvement and standardization of the security administration process
across all business units
Investigate, document and report any actual or potential information security violation
Lead computer forensic analysis, cyber-crime investigation, incident emergency response and
investigations
Experience/Abilities:






Knowledge of one or more of the following information security disciplines: intrusion detection
system (IDS) monitoring, incident response, information assurance, computer security best
practices, system hardening, vulnerability assessment, vulnerability management, antivirus,
firewalls, and techniques for analyzing TCP/IP network traffic and event logs
Experience with IDS software such as Snort or Cisco Secure IDS, log event correlation / security
information and event management (SIEM) tools such as ArcSight, vulnerability assessment tools
such as Nessus, network analysis / sniffer tools such as Ethereal, and policy management tools
such as Tripwire
Experience as a systems administrator in a Unix/Linux environment
Understanding of PII and ISO compliance mandates
Bachelor’s or Associates degree in information technology
For further information please call Ita Hodder on 0906478104 or email CV to ita.hodder@collinsmcnicholas.ie
Please Note: Collins McNicholas will not forward your details to any company without prior discussion
and your approval.
Download