What are the responsibilities and job description for the Security Analyst position at Target Hospitality?
Job Details
Description
Job Description:
The Security Analyst is responsible for safeguarding the organization's information systems by identifying, monitoring, and responding to potential security threats. This individual will conduct security assessments and ensure compliance with relevant security standards and regulations.
Key Responsibilities
Description
Job Description:
The Security Analyst is responsible for safeguarding the organization's information systems by identifying, monitoring, and responding to potential security threats. This individual will conduct security assessments and ensure compliance with relevant security standards and regulations.
Key Responsibilities
- Threat Identification and Analysis: Continuously monitor the organization's networks and systems for security breaches or intrusions. Identify potential threats and vulnerabilities and analyze them to understand their impact.
- Security Measures Implementation: Develop and implement protective measures to safeguard information against unauthorized access, modification, or destruction. This includes installing firewalls, data encryption, and other security tools.
- Incident Response: Lead the response to security incidents, including initial assessment, triage, containment, eradication, and recovery. Document incidents and their outcomes thoroughly.
- Security Assessments and Audits: Conduct regular security assessments and audits to identify vulnerabilities within the organization's infrastructure. Recommend and implement enhancements to improve security.
- Education and Training: Provide security awareness training to employees, educating them on the importance of security practices and how to avoid security threats.
- Research and Development: Stay abreast of the latest information technology security trends, tools, and techniques. Evaluate new security technologies to enhance the security posture of the organization.
- Bachelor's degree in Information Technology, Computer Science, or related field.
- Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Cisco Certified Internetwork Expert Security (CCIE Security), or Certified Ethical Hacker (CEH) are highly desirable.
- Proven experience in information security or related field.
- Strong knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusion detection systems).
- Knowledge of public key infrastructure (PKI) and cryptographic protocols (SSL/ TLS).
- Experience with computer network penetration testing and techniques.
- Understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts.
- Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
- Strong analytical and problem-solving skills.
- Excellent communication and interpersonal skills.
- SIEM (Splunk, Azure Sentinel, Logrythm..)
- Cisco Security Suite (Secure Malware Analytics, Secure Cloud Analytics, Umbrella)
- Cloud (AWS, Azure, GCP)
- Linux Systems (Debian Based)
- Windows Server 2019
- Cloudflare, Go Daddy