Job SummaryWe are seeking a detail-oriented and proactive Cyber Security Analyst to protect our organization’s systems, networks, and data from cyber threats. The ideal candidate will be responsible for monitoring security events, analyzing threats, responding to incidents, performing vulnerability assessments, and ensuring compliance with security standards and best practices.
Key Responsibilities- Monitor security alerts and events using SIEM tools.
- Analyze logs from firewalls, IDS/IPS, servers, endpoints, and cloud platforms.
- Investigate security incidents and perform root cause analysis.
- Respond to security breaches and coordinate containment and remediation.
- Conduct vulnerability assessments and support penetration testing activities.
- Manage patching and remediation of identified vulnerabilities.
- Implement and maintain security controls and policies.
- Perform risk assessments and recommend mitigation strategies.
- Support compliance with standards such as ISO 27001, NIST, PCI-DSS, and SOC 2.
- Manage endpoint protection tools, antivirus, EDR, and DLP solutions.
- Ensure proper identity and access management (IAM) controls.
- Prepare incident reports and security documentation.
- Stay updated with emerging threats, vulnerabilities, and attack techniques.
Required Skills & QualificationsEducation- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field.
Technical Skills- Experience with SIEM tools (e.g., Splunk, QRadar, Sentinel).
- Knowledge of network security concepts (TCP/IP, DNS, VPN, Firewalls).
- Hands-on experience with IDS/IPS systems.
- Familiarity with vulnerability scanning tools (Nessus, Qualys, OpenVAS).
- Understanding of security frameworks like NIST, ISO 27001.
- Knowledge of Windows/Linux system security.
- Experience with cloud security (AWS/Azure/GCP) is a plus.
- Basic scripting knowledge (Python, PowerShell, Bash).
Security Concepts- Incident Response Lifecycle
- Threat Intelligence & Threat Hunting
- Malware Analysis basics
- Risk Assessment Methodologies
- Access Control Models (RBAC, ABAC)
- Encryption & Cryptography fundamentals
Preferred Certifications- CEH (Certified Ethical Hacker)
- CompTIA Security+
- CISSP
- CISM
- GIAC Certifications
- Microsoft or AWS Security Certifications
Soft Skills- Strong analytical and problem-solving skills
- Good communication and documentation skills
- Ability to work under pressure during incidents
- Team collaboration skills
- Attention to detail
Experience Level- Entry-Level: 0–2 years (SOC monitoring, log analysis)
- Mid-Level: 2–5 years (Incident response, vulnerability management)
- Senior-Level: 5+ years (Threat hunting, architecture review, security leadership)