Security Operations Analyst
The Security Operations Analyst performs real-time analysis and trending of security log data from various security devices and systems. He/ She maintains data sources feeding the log monitoring system, develops and maintains detection and alerting rules. He responds to user incident reports and evaluates the type and severity of security events. He documents incidents and develops reports. He identifies recurring security issues and risks to develop mitigation plans and recommends process improvements. He interprets and applies security policies and procedures. He is required to be on standby with on-call availability with varied shifts including nights, weekends and holidays. He is familiar with cyber security standards, protocols and frameworks, and works in accordance with the Cyber Security Act 2018. He is knowledgeable in using various cyber security monitoring and testing tools and techniques. The Security Operations Analyst is diligent and takes an analytical approach to perform real-time analyses. He is skilled in synthesizing trends and insights, and is confident in putting forth creative mitigation plans and solutions to security incidents.
Skills and Competencies
Technical Skills & Competencies
Generic Skills & Competencies
Critical Work Functions and Key Tasks
• Carries out audits, reviews, security control assessments, and tests of security operations
based on established schedules and protocols
• Perform real-time analysis and trending of security log data from cyber security systems
• Analyse security event data to identify suspicious and malicious activities
• Provide inputs to improve security monitoring rules and alerts
• Document processes related to cyber security monitoring
• Implement cyber security protocols
• Formulate emergency response procedures
• Maintain data sources feeding the log monitoring system
• Schedule security checks in accordance with reporting schedules
• Prepare periodic status reports for presentation to management
• Review security incident reports
• Analyse the type and severity of cyber security incidents
• Assist in establishing procedures for handling detected cyber security incidents
• Provide status updates during the lifecycle of a cyber security incident
• Prepare final incident report detailing the events of the cyber security incident
• Support the maintenance and update of business recovery,
contingency plans and procedures