Process Analyst - Dubai, United Arab Emirates - ECS | Enterprise Change Specialists
Description
Job Description we are looking for a talented and enthusiastic individual to join our Information Security Team.
This role requires:
• 2-4 years of experience in information security management, in areas such as security monitoring, reporting, operations, intrusion detection, incident analysis, incident handling, log analysis, threat monitoring
Responsibilities
• Appropriately analyze, escalate, and assist in remediation of critical information security incidents
• Experience with Microsoft Cloud Security, Microsoft Azure Security, Microsoft AIP, Microsoft DLP
• Monitor and Review reports/logs from Microsoft Azure, Microsoft 365 Compliance Center, DLP, EDR, Firewalls, IPS, Vulnerability Assessment Tools, PAM and other sources and plan necessary actions
• Resolve problems independently and understand escalation procedure
• Maintain Vulnerability status dashboard and Vulnerability mitigation tracker to ensure regular vulnerability assessments are conducted covering all key technology areas as per the established process
• Ensure security baseline documents are defined, communicated and updated covering critical IT assets including databases, network devices, servers and end points.
• Maintain risk register to ensure the most accurate risk posture is reflected at any given time.
• Maintain audit tracker, conduct regular follow up with stake holders and ensure the closure of audit gaps within the agreed timelines. Ensure findings are not repeated in subsequent audits.
• Assist in maintaining the security compliance related to regulatory, audit and certification standards
• Maintain a high degree of awareness of the current threat landscape.
Qualifications
• A Degree in Computer Science, Information Systems, Electrical Engineering, or a closely related degree.
• Microsoft Azure Security Engineer, CISSP, CCSP or CEH certification would be desirable
• An active interest in Information Security, incident management, network and systems security
• A sound knowledge of IT security best practices, common attack types and detection/prevention methods
• Demonstrable experience of analyzing and interpreting system, security, and application logs
• Understanding and knowledge of events produced by firewalls, IDS/IPS, and other security related devices
• Understanding of TCP/IP, networking, and security protocols
• Knowledge of Cyber Kill Chain and MITRE ATT&CK frameworks
• Understanding of common attacks, malware and abnormal activities
• Strong analytical and problem solving skills
• A motivated, self-managed, individual who can demonstrate above average analytical skills and work professionally with peers and customers even under pressure
• Strong interpersonal skills with the ability to collaborate well with others