Cyber Security Analyst

Wipro Technologies
Al Jubayl
SAR 150,000 - 200,000
Job description

Role Purpose

The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information.

Do

  1. Ensuring customer centricity by providing apt cybersecurity
    1. Monitoring and safeguarding the log sources and security access.
    2. Planning for disaster recovery in the event of any security breaches.
    3. Monitoring for attacks, intrusions and unusual, unauthorized or illegal activity.
    4. Performing moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems.
    5. Conducting security assessments, risk analysis and root cause analysis of security incidents.
    6. Handling incidents escalated by the L1 team in 24x7 rotational shifts.
    7. Using advanced analytics tools to determine emerging threat patterns and vulnerabilities.
    8. Completing all tactical security operations tasks associated with this engagement.
    9. Analysing all the attacks and coming up with remedial attack analysis.
    10. Conducting detailed analysis of incidents and creating reports and dashboards.
  1. Stakeholder coordination & audit assistance
    1. Liaising with stakeholders in relation to cyber security issues and providing future recommendations.
    2. Maintaining an information security risk register and assisting with internal and external audits relating to information security.
    3. Assisting with the creation, maintenance and delivery of cyber security awareness training for colleagues.
    4. Providing advice and guidance to employees on issues such as spam and unwanted or malicious emails.

Stakeholder Interaction

Stakeholder Type: Internal

Stakeholder Identification: Technical Lead/ Project Lead

Purpose of Interaction: Regular reporting & updates.

Stakeholder Type: Security Intelligence (Practice)

Purpose of Interaction: Coordination for security reasons.

Stakeholder Type: External

Stakeholder Identification: Customer

Purpose of Interaction: To coordinate for all security breaches & resolutions.

Display

Lists the competencies required to perform this role effectively:

  • Functional Competencies/ Skill
    • Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - Expert
    • Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk - Expert
    • Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills - Master
  • Behavioral Competencies
    • Effective Communication
    • Collaborative Working
    • Execution Excellence
    • Problem Solving & Analytical Skills

Deliver

No.

Performance Parameter

Measure

1.

Customer centricity

Timely security breach solutioning to end users, Internal stakeholders & external customers experience.

2.

Process Adherence

Adherence to SLA’s (90-95%), response time and resolution time TAT.

Get a free, confidential resume review.
Select file or drag and drop it
Avatar
Free online coaching
Improve your chances of getting that interview invitation!
Be the first to explore new Cyber Security Analyst jobs in Al Jubayl