The Information Security Analyst Identifies security risks and exposures, determine the causes of security violations, and configuring systems to optimize notification of future incidents. The Security Analyst Integrates appropriate systems and logs into the enterprise security incident and event management system to effectively monitor and detect various people and enterprise asset activity. The Information Security Analyst works under the direction of the Information Security Director on the IT Security Operations Team.
• Investigates and analyzes security events to evaluate risk, prioritizing findings based on internal and external information.
• Configures and maintains SIEM platform, including areas such as source feeds, alerts, alarms, and API integrations.
• Configures and maintains EDR/antivirus.
• Configures and maintains vulnerability management platform, including areas such as vulnerability scanning, remediation, and mitigation as well as impact and risk analysis.
• Communicates security concerns to the business stakeholders to collectively develop and execute an appropriate remediation/mitigation plan.
• Interacts with security risk and compliance group, adjacent IT departments, and business units as needed to ensure compliance with IT Security goals and policies.
• When needed, assists in administration of other security tools (Data Loss Prevention, Email Security/Spam Filter, End User Training, Mobile Device Management).
• Maintains up-to-date knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and evolving attacks and threat vectors.
General Job Responsibilities:
• Ability to work in a team environment and independently as required
• Contributes to project planning and scheduling.
• Normally receives minimal instructions on routine work and detailed instructions on new assignments.
• Participate in Architecture design reviews and other technical governance forums across the organization representing the security team across multiple projects.
• Be on call and available after business hours, would require working Holidays and weekends if major security incident occurs.
• Establish and maintain pertinent policies, standards, and procedures
• Perform duties in compliance with applicable regulations and standards such as Sarbanes Oxley Act, FDA Quality System, and ISO (International Organization for Standardization) Works on routine assignments per written procedures, where ability to recognize deviation from accepted practice is required.
• Contributes to the overall operations and to the achievement of departmental goals
• Perform job specific tasks in compliance with applicable Regulations, International Standards, and WuXi AppTec Policies and Standard Operating Procedures.
• Understanding of Good Laboratory Practices and Good Manufacturing Practices
• Other duties as assigned
• Degree in Cyber Security, Management Information Systems, Information Security or equivalent work experience
o Minimum 2 years prior experience in a Cyber Security
• In depth knowledge of LogRhythm SIEM platform or other SIEM platforms, which includes configuring and maintaining API integrations and source feeds, alerts and alarms
• In depth knowledge in Qualys Vulnerability Management System, which includes configuring and maintaining
• In depth knowledge in Cisco AMP Anti-Virus software, which includes configuring and maintaining
• Knowledge of ISO/IEC 27001 standards.
• Strong technical acumen with a solid understanding of security technologies and network architecture
• Strong verbal and written communication skills
• Independent driver of self-development and continuous learning
• Knowledge of information security technology, design, research techniques, administration, operating standards, and quality control methods.
• Basic understanding of LAN/WAN technologies and protocols, FTP, Active Directory, VPN technologies (MPLS, IPSEC, etc.), IIS and other network services.
• Experience in a large, formal vulnerability program.
• General knowledge of cloud, wireless network and mobile security.
• Team-oriented and skilled in working within a collaborative environment.
An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability
This job description does not state or imply that the above are the only duties and responsibilities assigned to this position. Employees holding this position will be required to perform any other job-related duties as requested by Management.
Software Powered by iCIMS
www.icims.com