Enable job alerts via email!

Analyst – IT Security II

First Solar

Kedah

On-site

MYR 50,000 - 70,000

Full time

Today
Be an early applicant

Job summary

A leading renewable energy company in Kedah, Malaysia, seeks an IT security analyst responsible for the technical analysis and support of specific security products and systems. Candidates should have a bachelor's degree in IT or related field, with strong knowledge of security operations and troubleshooting skills. The role includes operational support for security systems, project work on software deployment, and problem resolution related to IT security infrastructure.

Qualifications

  • 2 years of relevant work experience.
  • Working knowledge and/or demonstrated experience with security tools.
  • 1+ years of experience with network security scanning tools is required.
  • 1+ years of experience with Microsoft operating systems is required.
  • Strong knowledge of security operations, script reading and understanding.

Responsibilities

  • Provide operational support of security products/systems.
  • Investigate, troubleshoot, analyze and resolve IT security problems.
  • Monitor and audit security aspects of IT operations.
  • Participate in solution design reviews.
  • Analyze business processes and recommend new approaches.

Skills

Security tools
Network security scanning tools (Nessus, Qualys, ISS)
Microsoft Windows operating systems
Active Directory administration
Linux distribution experience
Cyber investigation methodology
Event analysis and incident response
Programming languages (JavaScript, Python, PowerShell, C#)
Firewalls (Palo Alto)
SIEM systems (Splunk)

Education

Bachelor’s degree in IT, Computer Science or related field
Job description
Overview

Responsible for the technical analysis and support of specific security products and/or systems (examples: IdM, NERC-CIP, IDS/IPS, Palo Alto… etc.). Focuses on the day-to-day operation of these targeted products/systems and escalated incident review.

Education/Experience
  • 2 years of relevant work experience. Bachelor’s degree in IT, Computer Science or related field preferred.
  • Working knowledge and/or demonstrated experience with security tools is required.
  • 1+ years of experience with IdM, UBA, ATD, IPS/IDS, NERC/CIP controls is a plus.
  • 1+ years of experience with network security scanning tools (Nessus, Qualys, ISS, etc.) required.
  • 1+ years of experience with Microsoft Windows 10, 7 and XP operating systems is required.
  • 1+ years of experience with Microsoft Windows Server 2008 R2, 2012 R2 or 2016 operating systems is required.
  • 1+ years of experience with Network server / Active Directory (AD) administration is required.
  • 1+ years of experience with any Linux distribution is desired; experience with CentOS is a plus.
  • Hands-on technical experience and strong knowledge of security operations, script reading and understanding, basic knowledge in languages such as JavaScript, Python, PowerShell, C#.
  • Strong understanding of event analysis, incident response, threat intelligence, cyber investigation methodology and chain-of-custody requirements.
  • Working knowledge of risk assessments, penetration testing, vulnerability analysis or disaster recovery.
  • Working knowledge of Firewalls; Palo Alto firewalls is a plus.
  • Working knowledge or prior experience with SIEM (Splunk preferred) and end-point protection (SCEP, Sophos, Bit9, Carbon Black) is a plus.
  • Working knowledge of integrated MFA with OAuth or SAML technologies; 1+ years’ experience with ADFS or IDaaS preferred.
  • Working knowledge and/or prior experience with Digital Rights Management is a plus.
Primary Responsibilities
  • Operational day-to-day support of targeted security products/systems.
  • Work on projects related to evaluating, testing, and deployment of new software systems/technology.
  • Investigate, troubleshoot, analyze and resolve problems related to the IT security infrastructure as well as application and system problems escalated for senior level support.
  • Monitor and audit security aspects of IT and product operations.
  • Audit the First Solar AD structure to verify that only necessary rights and privileges are assigned.
  • Participate in solution design reviews for applications, servers and networking.
  • Assess escalated incidents from business departments or Security Team members.
  • Ensure compliance with Quality, Environment, Health and Safety and Responsible Business Alliance policies and procedures.
  • Undertake analytical activities and deliver analysis outputs in accordance with customer needs and security standards.
  • Analyze business processes, identify alternative solutions, assess feasibility, and recommend new approaches; help establish requirements for changes in business processes.
  • Investigate operational requirements, problems, and opportunities, seeking effective business solutions through improvements in automated and non-automated components of new or changed processes; identify acceptance tests with clients/users.
  • Define scope and business priorities for small-scale changes and assist in larger scoping; elicit and document detailed requirements and ensure traceability; prioritize requirements with stakeholders.
  • Specify and develop test scenarios to ensure updated processes deliver improved ways of working and deliver business benefits; record and analyze test results and provide user instructions.
  • Apply data analysis and data modeling to establish or modify data structures.
  • Review requirements and specifications, define test conditions, design test cases and scripts, map to criteria, and report outcomes; identify risks and issues.
  • Discuss user experience and environment requirements to determine how complex products or systems will operate.
  • Develop implementation plans for more complex change requests; evaluate risks to infrastructure, obtain approval, review change effectiveness, and contribute to change management procedures.
  • Lead assessment, analysis, development, documentation and implementation of changes based on change requests.
  • Identify and resolve issues with applications, using management tools to collect performance statistics and perform maintenance tasks.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.