Our client, a global manufacturing firm, is looking to improve and enhance their internal approach to managing 3rd party SOC alerts generated by Sentinel managed SIEM and from their existing tool base: Netskope, Darktrace, SentinelOne, and Tenable. We are looking for an analyst who can be hands-on to tune the technologies, help to remediate alerts, and develop internal processes.
Role Requirements
The Cyber and Information Security Analyst is responsible for triaging information from external/internal sources and actioning upon the information.
The person will have excellent communication skills and the ability to influence at all levels.
The individual will own the risks from start to finish and be responsible for investigating and closing risks.
Will have hands-on experience with Netskope, Darktrace, and Sentinel.
Provide policy guidance in security models, software, tools, and standards (e.g. NIST, ISO27001/5).
Development of tools and techniques to test for cyber vulnerabilities and exploits.
Work with all suppliers, contractors, and consultants to maintain and enhance information security and cyber resilience.
Identify cyber risks specific to information systems and produce remediation action plans.
Stay abreast of industry security trends and developments, as well as applicable government regulations.
Contribute to the advance of organizational cyber resilience through solutions that allow for secure but convenient access to information, complying with best practices and any regulatory mandates. Solutions include identity and access management, threat and vulnerability management, mobile security, and encryption technologies.