Job Purpose:
The main purpose of the Information Protection Analyst is to perform the assigned jobs under one of the following functions:
- Access Management.
- Security & Vulnerability Management.
- Security Intelligence Center.
Functional Duties:
The main responsibilities of the Information Protection Analyst include:
- Identifying, analyzing, monitoring, mitigating, and managing threats and vulnerabilities to IT systems and networks.
- Applying service-oriented security architecture principles to meet the organization’s confidentiality, integrity, and availability requirements.
- Using defensive measures and multi-source information to report events and respond to incidents.
- Utilizing data collected from cyber defense tools to analyze events that occur within the organization to detect and mitigate cyber threats.
- Ensuring all systems security operations and maintenance activities are properly documented and updated as necessary.
- Testing, implementing, deploying, maintaining, and administering hardware and software that protect and defend systems and networks against cybersecurity threats.
- Managing individuals and entities' identities and access to resources through applying identification, authentication, and authorization systems and processes.
- Ensuring identity access management implementations follow the organization’s standards and policies.
- Performing vulnerability assessments of systems and networks, identifying deviations from acceptable configurations or applicable policies, and measuring the effectiveness of defense-in-depth architecture against known vulnerabilities.
- Collecting and analyzing digital evidence, investigating cybersecurity incidents to derive useful information to mitigate system and network vulnerabilities.
- Identifying, collecting, examining, and preserving evidence using controlled and documented analytical and investigative techniques.
- Collecting and analyzing multi-source information about cybersecurity threats to develop a deep understanding and awareness of cyber threats and actors' Tactics, Techniques, and Procedures (TTPs), to derive and report indicators that help organizations detect and predict cyber incidents and protect systems and networks from cyber threats.
- Proactively searching for undetected threats in networks and systems, identifying their Indicators of Compromise (IOCs), and recommending mitigation plans.
- Designing and overseeing the development, implementation, and configuration of cybersecurity systems and networks.
- Ensuring that protection and detection capabilities are aligned with the organization’s cybersecurity strategy, policies, and other related documentation.
Education:
Essential: Bachelor’s degree in computer science, engineering, cybersecurity, or any related field.
Professional Qualifications:
Preference: Cybersecurity Professional Certification, such as Security+, CISSP, CCNA Security, or CEH.