Enable job alerts via email!

Information Protection Analyst

Sadara Chemical Company

Saudi Arabia

On-site

SAR 150,000 - 200,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking an Information Protection Analyst to enhance their cybersecurity posture. This role involves identifying and mitigating threats to IT systems, ensuring compliance with security policies, and managing access to resources. The ideal candidate will have a strong foundation in cybersecurity principles and will be responsible for utilizing advanced tools to analyze and respond to incidents effectively. Join a forward-thinking organization where your expertise will contribute to safeguarding critical information and enhancing security measures in a dynamic environment.

Qualifications

  • Bachelor's degree in computer science or related field is essential.
  • Cybersecurity certifications like Security+, CISSP are preferred.

Responsibilities

  • Identify and manage threats and vulnerabilities to IT systems.
  • Ensure all security operations and maintenance activities are documented.
  • Conduct vulnerability assessments and collect digital evidence.

Skills

Threat Analysis
Vulnerability Management
Incident Response
Access Management
Cybersecurity Principles

Education

Bachelor’s degree in computer science
Bachelor’s degree in engineering
Bachelor’s degree in cybersecurity

Tools

Cyber Defense Tools
Identity Access Management Systems

Job description

Job Purpose:

The main purpose of the Information Protection Analyst is to perform the assigned jobs under one of the following functions:

  1. Access Management.
  2. Security & Vulnerability Management.
  3. Security Intelligence Center.

Functional Duties:

The main responsibilities of the Information Protection Analyst include:

  1. Identifying, analyzing, monitoring, mitigating, and managing threats and vulnerabilities to IT systems and networks.
  2. Applying service-oriented security architecture principles to meet the organization’s confidentiality, integrity, and availability requirements.
  3. Using defensive measures and multi-source information to report events and respond to incidents.
  4. Utilizing data collected from cyber defense tools to analyze events that occur within the organization to detect and mitigate cyber threats.
  5. Ensuring all systems security operations and maintenance activities are properly documented and updated as necessary.
  6. Testing, implementing, deploying, maintaining, and administering hardware and software that protect and defend systems and networks against cybersecurity threats.
  7. Managing individuals and entities' identities and access to resources through applying identification, authentication, and authorization systems and processes.
  8. Ensuring identity access management implementations follow the organization’s standards and policies.
  9. Performing vulnerability assessments of systems and networks, identifying deviations from acceptable configurations or applicable policies, and measuring the effectiveness of defense-in-depth architecture against known vulnerabilities.
  10. Collecting and analyzing digital evidence, investigating cybersecurity incidents to derive useful information to mitigate system and network vulnerabilities.
  11. Identifying, collecting, examining, and preserving evidence using controlled and documented analytical and investigative techniques.
  12. Collecting and analyzing multi-source information about cybersecurity threats to develop a deep understanding and awareness of cyber threats and actors' Tactics, Techniques, and Procedures (TTPs), to derive and report indicators that help organizations detect and predict cyber incidents and protect systems and networks from cyber threats.
  13. Proactively searching for undetected threats in networks and systems, identifying their Indicators of Compromise (IOCs), and recommending mitigation plans.
  14. Designing and overseeing the development, implementation, and configuration of cybersecurity systems and networks.
  15. Ensuring that protection and detection capabilities are aligned with the organization’s cybersecurity strategy, policies, and other related documentation.

Education:

Essential: Bachelor’s degree in computer science, engineering, cybersecurity, or any related field.

Professional Qualifications:

Preference: Cybersecurity Professional Certification, such as Security+, CISSP, CCNA Security, or CEH.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.