Analyst, Cyber Security Job Description
Analyst, Cyber Security Duties & Responsibilities
To write an effective analyst, cyber security job description, begin by listing detailed duties, responsibilities and expectations. We have included analyst, cyber security job description templates that you can modify and use.
Sample responsibilities for this position include:
Analyst, Cyber Security Qualifications
Qualifications for a job description may include education, certification, and experience.
Licensing or Certifications for Analyst, Cyber Security
List any licenses or certifications required by the position: CISSP, GIAC, CEH, SANS, III, ISC, IAT, GCIA, ITIL, ISO
Education for Analyst, Cyber Security
Typically a job would require a certain level of education.
Employers hiring for the analyst, cyber security job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and Master's Degree in Computer Science, Technical, Engineering, Information Technology, Education, Information Systems, Cyber Security, Technology, Information Security, Computer Engineering
Skills for Analyst, Cyber Security
Desired skills for analyst, cyber security include:
Desired experience for analyst, cyber security includes:
Analyst, Cyber Security Examples
Analyst, Cyber Security Job Description
- Review and verify policies and procedures are developed in line with all applicable federal and LOC security standards and regulations
- Maintain, track, and communicate detailed project tasks
- Manage initial and reauthorization System Assessment and Authorization (SAA)/ Security Controls Assessment (SCA) task and milestone, task dependencies for low, moderate, and high security systems
- Ensure document deliverables are created, reviewed, and/or updated to include, by not limited to, Privacy Threshold Assessment (PTA)/ Privacy Impact Analysis (PIA), Business Impact Assessment (BIA), Contingency Plans (CP), Configuration Management Plan (CMP), Change Management Plans, Incident Response Plans (IRP), Plan of Action and Milestones (POA&Ms), Security Assessment Reports (SAR), Memorandum of Understanding / Interconnection Security Agreement (ISA) and other documents as necessary
- Categorize and determine baseline IT security requirements in accordance with FIPS 199
- Identify and visually demonstrate system boundaries, select security controls, and ensure implemented controls are adequate for COTS or proprietary web applications
- Ensure security policies are developed, maintained and updated to meet IT security best business practices and standards, which may include ISO 27001, Federal Info Security Management Act (FISMA), and National Institute of Standards and Technology (NIST) 800-53 - ITL and FIPS federal info processing standard
- Be able to review security scans, triage vulnerabilities, and be able to provide recommendations on mitigating security risks
- Review hosting, security, and audit compliance to current LOC policies, provide quality assurance (QA) reviews
- Assist testing teams as necessary with coordinating with developers and operations staff to provide evidence as necessary
- Broad knowledge of IT security vendors and products
- Must maintain DoD 8570.1 certification requirements for IAT-II (Must meet certification within six months of date of hire)
- Requires documented training in Microsoft Windows Server or Cisco Administration
- Position requires ability to provide coverage outside normal working hours or shifts in daily hours
- Requires a current Secret Security Clearance and ability to pass an SSBI investigation
- Requires a valid state issued driver's license
Analyst, Cyber Security Job Description
- Designs, tests, and implements secure networks, security monitoring, tuning and management of IT security systems and applications, incident response
- Plans and Schedules time lines for the project and security initiatives
- Tracks and reports on project deliverables
- Creates and presents project reports on projects
- Maintain established departmental policies and procedures, objectives, quality assurance programs and safety and compliance standards
- In the customer integration he act as a SME
- In the operations, he is the one who should challenge the customer when the requirements are not aligned on security best practices
- Conduct research on emerging products, services, protocols, and exploits in support of security enhancement and development efforts and emerging security alerts and issues
- Perform security improvements, upgrades, and/or purchases and assist in the management and maintenance of all security systems and their corresponding or associated software
- Work with GSOC (Global Security Operations Center) on ministry-wide issues involving security-related concerns, and liaison with Security Administrator on all correlated issues
- Strong knowledge of security processes and technologies including IDS/ IPS, threat analysis, SIEM, vulnerability assessment
- Attack Analysis Techniques
- Business Applications involving N-Tier architecture
- Developing device drivers and use of emulators for systems analysis
- The individual in this position demonstrates investigative and analytical problem solving skills
- Intermediate knowledge of application scanning, penetration testing, and vulnerability management
Analyst, Cyber Security Job Description
- Provide technical support within a cross functional team
- Participate in timely implementations of strategic solutions with a focus on using Agile methodology to iterate fast on design, build, test, and delivery of digital solutions for manufacturing
- Assist with the remediation of identified security events
- Support internal Human Resources (HR)/Legal/Ethics investigations
- Review threat data from multiple sources and develop recommendations for securing end points (tuning) or implementation of policy updates
- Communicate with customer technical staff and management
- Methodically gather, document, and present specific customer requirements
- Follow existing processes and procedures, and propose updates to such
- Conduct monitoring, analysis, and reporting for key financial information systems
- Provide reporting under the Sarbanes Oxley Act of 2002 (SOX)
- Advanced knowledge of cyber security operations, engineering, and architecture
- Proficiency with network analysis techniques and the ability to use commonly used log collection, aggregation and analysis tools, specifically Splunk
- Proficiency with forensic techniques and the most commonly used forensic toolsets, specifically the full EnCase suite
- Proficiency with MS Office Applications, and familiarity with Windows, Macintosh and Linux operating systems
- Experience with Windows operating system functionality (file system structure, registry keys, scheduled tasks, processes, services, memory management, data storage)
- A Bachelor's Degree in Computer Science, CyberSecurity, Information Systems, engineering, or other related scientific or technical discipline and 2 years related experience
Analyst, Cyber Security Job Description
- Coordinate with both internal and external auditors to assist with and respond to audit findings
- Participate in creating and executing an Identity and Access Management strategy to address SRP's evolving needs
- Third level support for security incident handling, support escalations and develop remediation plan
- Reduce false positives by tuning of detection policies
- Quality assurance, review event handling and improving analyst workflows
- Close interaction with IT development around bugs and platform enhancements
- Liaise with the Threat Library team to enhance correlation use cases
- Support the incubation phase of new products and services
- Maintaining the currency of each program’s security documentation
- Entering documentation completed and submitted in eMASS for system changes
- Needs to have an understanding of threat vectors exfiltration techniques
- Nexpose Rapid 7 Vulnerability Scanner
- Previous experience in troubleshooting day-to-day operational processes such as report generation, data verification, data correlation
- Follows existing processes and procedures, and propose updates to such
- Hands on experience configuring, deploying, and managing mission critical network appliances such as routers, firewalls, IDS/IPS, DPI
- Hands on system administraqtion experience with various operating systems including Windows, AIX, BSD, z/OS, RHEL, SUSE, HPUX, QNX
Analyst, Cyber Security Job Description
- Acting as the Cyber Security contact for RBSI development and transformation
- Understanding and communicating the Cyber Security strategy, plans and ideas to the rest of team
- Building and continually updating a personal succession plan within Cyber Security, linking development opportunities to ensure the future success of the team as a whole
- Support identification and resolution of vulnerabilities
- Analyze data sets and support alert and response activities
- Provide data driven insights into improvement opportunities for security operations workflow design
- Interface with other security teams and assist with general IT security as required
- Perform root cause analysis of moderate to highly complex security issues
- Help stakeholders to determine the best course of action to remedy the problem
- Ensure the ongoing core objectives of the SOC are accomplished and measurable
- Must have familiarity in IA requirement generation, IA architecture design, IA audit tools and IA compliance for mission systems
- Direct experience with Malware analysis techniques and methodologies.Working knowledge of the Linux Operating system (CentOS, Red Hat, Ubuntu).Scripting Skills
- Understanding of TCP/IP, ports, protocols, and system functions (file I/O, registry, file permissions)
- Experience performing Vulnerability Management in an enterprise environment
- Knowledge of security and network incident response procedures
- Experience in security policy development