Enable job alerts via email!

IT Information Security Analyst

Excelsior Staffing

Birmingham

On-site

GBP 40,000 - 70,000

Full time

21 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a skilled Security Analyst to safeguard its computing environment from cyber threats. In this pivotal role, you will be responsible for identifying vulnerabilities, implementing security measures, and responding to incidents that impact the company’s digital infrastructure. Your expertise in penetration testing, risk assessment, and security protocols will be crucial in protecting sensitive information and ensuring compliance with regulations. Join a forward-thinking team that values innovation and security, and make a significant impact in a dynamic environment where your contributions will be essential to the company's success.

Qualifications

  • 5+ years of experience as a security analyst required.
  • Strong knowledge of penetration testing and vulnerability remediation.
  • Experience with firewalls, proxies, and security appliances.

Responsibilities

  • Detect and prevent cyber threats to the company's computing environment.
  • Plan and implement security measures for networks and information.
  • Conduct internal security audits and vulnerability testing.

Skills

Penetration testing
Vulnerability testing
Anti-virus and anti-malware
TCP/IP networking
Firewalls and security appliances
Windows operating system
Linux operating system
Scripting languages (C#, VB, Python)
Cloud computing
Network protocols

Education

Bachelor’s degree in Information Technology
Bachelor’s degree in Computer Science
Bachelor’s degree in Cybersecurity

Tools

Intrusion Detection Systems (IDS)
Intrusion Prevention Systems (IPS)
Packet analysis tools

Job description

General Responsibilities:

Responsible for constantly detecting and preventing cyber threats to the company computing environment. Identify weaknesses of the company computing infrastructure (software, hardware, networks) and find creative ways to protect it. Plan, implement, upgrade, or monitor security measures to protect computer networks and information. Ensure appropriate security controls are in place to safeguard digital files and vital electronic infrastructure. Serves as an internal company lead for responding to business-impacting computer security breaches and viruses. Night and weekend hours as needed.

Essential Job Functions:

  1. Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  2. Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  3. Plan, implement and upgrade security measures and controls.
  4. Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and destruction.
  5. Maintain data and monitor security access.
  6. Perform vulnerability testing, risk analyses and security assessments.
  7. Perform risk assessments and execute tests of the data processing system to ensure the functioning of data processing activities and security measures.
  8. Conduct internal security audits.

Additional Essential Job Functions:

  1. Anticipate security alerts, incidents, and disasters and reduce their likelihood.
  2. Collaborate technically with the infrastructure team to manage the network, intrusion detection, prevention systems and encryption measures.
  3. Analyze security breaches to determine the root cause.
  4. Recommend and install appropriate tools and countermeasures.
  5. Define, implement, and maintain corporate security policies.
  6. Collaborate with the appropriate areas to train fellow employees in security awareness and procedures.
  7. Coordinate security plans with outside vendors.

Further Essential Job Functions:

  1. Respond to eDiscovery, data collection queries, and digital forensics requests.
  2. Work an on-call rotating schedule outside the regular schedule on a rotating basis.
  3. Maintain and protect sensitive and private information by keeping employee records confidential in accordance with HIPAA, local, state, and federal laws and regulations.
  4. Ensures that PHI/ePHI of employees, plan participants, patients, and other assigned individuals are maintained and transmitted securely and legally.
  5. Perform all work safely in accordance with established safety policies and procedures. Comply with all safety and health standards and guidelines issued by management.
  6. Perform other duties as assigned.

Education:

  1. Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or related field required.

Experience:

  1. Five (5) years of experience, specifically in a security analyst job required.
  2. Penetration testing and vulnerability testing & remediation.
  3. Anti-virus and anti-malware.
  4. TCP/IP, computer networking, routing and switching.
  5. Firewalls, proxies, IDS, IPS, and security appliances.
  6. Windows and Linux operating systems.
  7. Network protocols and packet analysis tools.
  8. Comprehension of development & scripting languages (C#, VB, Python, C, .NET).
  9. Cloud computing.

Certificates, Licenses, Registrations:

  1. Valid driver’s license required.
  2. The following certifications are highly preferred:
  3. CEH Certified Ethical Hacker.
  4. ECSA EC-Council Certified Security Analyst.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.