Cyber Risk Analyst
The Cyber Risk Analyst conducts cyber risk assessment in support of technology initiatives to help identify IT related risk and determines appropriate controls to mitigate risks. He/She monitors, tracks and manages risk mitigations and exceptions to ensure cyber security standards and policies are established. He applies a defined set of analytical or scientific methods and works independently. He is also responsible for documentation of cyber risk assessment reports. He is familiar with cyber security standards, protocols and frameworks, and acts in accordance with the Cyber Security Act 2018. He is knowledgeable in using various cyber security monitoring and analysis tools and techniques depending on the organization's needs and requirements. The Cyber Risk Analyst is vigilant and systematic in identifying cyber risks and enjoys analyzing and investigating such issues. He is a strong team player, and communicates well both verbally and in writing.
Skills and Competencies
Technical Skills & Competencies
Generic Skills & Competencies
Critical Work Functions and Key Tasks
• Conduct review of existing security policies, procedures, standards and exceptions
• Assist in the development of policies for conducting cyber security risk assessments
and compliance audits
• Support implementation of information systems and cyber security policies
• Perform cyber risk assessment activities based on risk assessment plans
• Assess third party security controls and internal security systems
• Establish scope of risk analysis for new technology initiatives
• Conduct research on emerging cyber security and risk management trends, issues, and alerts
• Monitor risks and incidents in accordance with the risk mitigation policies and guidelines
• Document methodologies and tools to mitigate cyber risks
• Prepare reports for cyber risk assessment reporting
• Conduct research to develop internal threat awareness reports
• Determine cause of security violations
• Recommend corrective actions or appropriate controls to mitigate technical risks
• Assist in the implementation of preventive measures against intrusion, frauds, attacks or leaks
• Track remediation efforts for security and audit deficiencies