London Approach · 1 week ago
Cyber Security Analyst
Wonder how qualified you are to the job?
Insider Connection @London Approach
Responsibilities
Oversee security for new processes, enhancements, and services.
Manage authentication, authorization, domain services, auditing, logging, and device security.
Implement and manage security monitoring tools.
Propose and enforce security policies and technologies to address threats and trends.
Ensure security compliance across all system phases.
Use approved methodologies and monitor success metrics for security initiatives.
Administer penetration and vulnerability assessments, audits, and phish campaigns.
Conduct security training and awareness programs.
Maintain cybersecurity equipment, software, and services.
Implement technology to prevent and respond to security threats, including regular vulnerability assessments, log analysis, and proactive threat hunting.
Ensure recovery from security risk events and respond to cybersecurity alerts.
Develop and adhere to a roadmap for the security portfolio, executing projects and setting priorities based on strategic goals.
Ensure compliance with policies, guidelines, regulations, and contractual obligations; lead risk assessments and remediation plans.
Assess technology purchases and vendor cybersecurity.
Respond to and implement recommendations from audits and security assessments.
Implement redundancy in applications and services, maintain records, and enhance the Incident Response Plan.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Bachelor’s Degree in Computer Science, Information Technology, or related field.
Minimum five years of experience in technology security or equivalent education and experience.
Professional certifications such as CISSP, CEH, or equivalent.
Knowledge of security, networking, and technology infrastructure concepts.
Experience with various operating systems (Windows, Linux, MacOS), Active Directory, virtualization, backups/disaster recovery, file systems, email server administration, databases, and enterprise applications.
Experience in designing and implementing technology security.
Managing complex initiatives and ensuring compliance with policies and regulations.
Skills in time and risk management, problem-solving, and effective communication.
Expertise in security controls and frameworks, vulnerability scanning, endpoint detection, firewalls, SIEM, IAM, multifactor authentication, Active Directory security, technology networking, and zero trust architecture.