Cyber Risk Analyst

The Cyber Risk Analyst conducts cyber risk assessment in support of technology initiatives to help identify IT related risk and determines appropriate controls to mitigate risks. He/She monitors, tracks and manages risk mitigations and exceptions to ensure cyber security standards and policies are established. He applies a defined set of analytical or scientific methods and works independently. He is also responsible for documentation of cyber risk assessment reports. He is familiar with cyber security standards, protocols and frameworks, and acts in accordance with the Cyber Security Act 2018. He is knowledgeable in using various cyber security monitoring and analysis tools and techniques depending on the organization's needs and requirements. The Cyber Risk Analyst is vigilant and systematic in identifying cyber risks and enjoys analyzing and investigating such issues. He is a strong team player, and communicates well both verbally and in writing.

Skills and Competencies

Technical Skills & Competencies

Audit and Compliance
Proficiency Level
"Conduct audits, analyze results and implement changes to address identified gaps"
3
Business Needs Analysis
Proficiency Level
"Elicit and analyze business requirements from key stakeholders and assess relevant solutions and their potential impact"
3
Cyber and Data Breach Incident Management
Proficiency Level
"Troubleshoot incidents, escalate alerts to relevant stakeholder, and analyze root causes and implications of incidents "
3
Cyber Forensics
Proficiency Level
"Coordinate the collection and preservation of evidence and analyze forensic evidence to draw inferences "
3
Cyber Risk Management
Proficiency Level
"Develop cyber risk assessment techniques and roll-out endorsed measures to address identified cyber security risks, threats and vulnerabilities "
4

Generic Skills & Competencies

Digital Literacy
Proficiency Level
Use available software features to enhance documents, analyse and manipulate data and use ICT to organize, share and communicate information clearly and coherently.
Advanced
Computational Thinking
Proficiency Level
Develop and create computational models, tools and techniques to implement new solutions and apply to other problems.
Advanced
Sense Making
Proficiency Level
Analyse data relationships, patterns and trends to gain important insights and make informed decisions.
Advanced
Transdisciplinary Thinking
Proficiency Level
Co-relate material from diverse knowledge bases to guide decisions and policy making. Participate in reflective and trans-disciplinary communities within and outside the organization.
Intermediate
Problem Solving
Proficiency Level
Anticipate potential problems beyond the current scope and apply higher order problem solving tools and techniques to turn problems into opportunities.
Advanced

Critical Work Functions and Key Tasks

Establish cyber security standards and policies

• Conduct review of existing security policies, procedures, standards and exceptions 
• Assist in the development of policies for conducting cyber security risk assessments 
and compliance audits 
• Support implementation of information systems and cyber security policies

Manage cyber risks and assessments

• Perform cyber risk assessment activities based on risk assessment plans 
• Assess third party security controls and internal security systems 
• Establish scope of risk analysis for new technology initiatives 
• Conduct research on emerging cyber security and risk management trends, issues, and alerts 
• Monitor risks and incidents in accordance with the risk mitigation policies and guidelines 

Develop cyber risk documentation

• Document methodologies and tools to mitigate cyber risks 
• Prepare reports for cyber risk assessment reporting 
• Conduct research to develop internal threat awareness reports

Mitigate cyber security risks

• Determine cause of security violations 
• Recommend corrective actions or appropriate controls to mitigate technical risks 
• Assist in the implementation of preventive measures against intrusion, frauds, attacks or leaks 
• Track remediation efforts for security and audit deficiencies

Get yourself a new skill

In this Path

Coming soon...