Role Overview : The Sr. Security Analyst assesses information risk and facilitates remediation of identified vulnerabilities with Smith & Nephew network, systems and applications.
S / he reports on findings and recommendations for corrective action. In this capacity, this individual performs vulnerability assessments utilizing IT security tools and methodologies.
This highly visible employee facilitates and monitors performance of risk remediation tasks, changes related to risk mitigation and reports on findings.
The Sr. Security Analyst maintains oversight of IT and vendors regarding the security maintenance of their systems and applications.
S / he provides weekly project status reports, including outstanding issues. In this role, this individual assists in all IT audits, IT risk assessments, and regulatory compliance.
Responsibilities : (20%) Security Incidents responsible for ownership from beginning to end (investigation, documentation, and remediation)(20%) Monitoring including native consoles, security information and event management, correlation tools, and other analysis tools that watch for threats, vulnerabilities, or environmental changes that affect risk.
20%) Implementing or approving configuration changes on some platforms in conformance with change management and control, deploying patches for security products, providing input on the deployment of patches for non-security products, and making recommendations as to when out-of-cycle patches are required.
20%) Helping enforce enterprise security policies and developing security operations procedures.(15%) Acting as an operational interaction, performance and SLA compliance-monitoring contact for any managed security service provider (MSSP) used by the enterprise, and monitoring the MSSP's portal.
Incident Management - Liaising and integrating with other IT operations and service management processes (such as problem management and configuration management) as appropriate(5%) On Call for Security Incidents as neededEducation : Bachelor's degree in computer science, information systems and / or equivalent formal training or work experience.
Five years of experience in IT information security.Licenses / Certifications : Current CISSP, CRISC, CISA, GIAC or equivalent certification preferred.
SANS-related certifications EducationExperience : 5+ years of experience as an Information Security Administrator or Engineer.
2+ years in hands-on application development.2+ years of Application Security.Strong understanding of mitigating security controls (i.
e., anti-virus, IPS / IDS, email filtering, web site blocking, patching) and how they work in an overall defence in-depth risk assessment methodology.
Working experience with Agile, SAFe, CI / CD, DevSecOpsExperience with vulnerability management and risk assessmentKnowledge of cyber security standard frameworks such as ISO and NIST Understanding of network infrastructure, including firewalls, web proxy and / or email architecture- particularly as they apply in a mitigating control functionalityExperience with different cloud computing platforms and the cloud security framework.
Ability to design, recommend, plan, develop and support implementation of innovative security solutions.Competences : Excellent written and oral communication skills.
Excellent customer service skills and problem resolution.Experience in being able to manage and prioritize multiple tasks in an effective manner.
Ability to work independently without daily direction.Understanding of back-channels typically used by actors for malicious activity.
Understanding of obfuscation techniques and best practices for ensuring device non-attribution.Understanding of one or more Technology Platforms (Windows, Linux, Middleware Applications, Database Applications) - specifically as they apply to successful security control mitigation and particularly to vulnerability management.
Understanding of distributed denial of service attack intelligence gathering, concepts, mitigation tools, and techniques.
Understanding of mobility security device and application risk and threat assessment.Understanding of nation and non-nation state actors, hacktivist groups, advanced threats, and the "kill chain" methodology.
Familiarity with secure coding best practices.Strong communication & organizational skills, ability to multi-task, strong attention to details, excellent problem solving and follow-up skills required.
Key Skills and Responsibilities (SFIA Based) : ASUP Level 4 Maintains application support processes, and checks that all requests for support are dealt with according to agreed procedures.
Uses application management software and tools to investigate issues, collect performance statistics and create reports.
SCAD Level 4 Maintains security administration processes and checks that all requests for support are dealt with according to agreed procedures.
Provides guidance in defining access rights and privileges. Investigates security breaches in accordance with established procedures and recommends required actions and supports / follows up to ensure these are implemented.
HSIN - Level 5 Takes responsibility for installation projects, providing effective team leadership, including information flow to and from the customer during project work.
Develops and implements quality plans and method statements. Monitors the effectiveness of installations and ensures that appropriate recommendations for change are madINAN - Level 4 Applies a range of mathematical, statistical, predictive modelling or machine-learning techniques in consultation with experts if appropriate, and with sensitivity to the limitations of the techniques.
Selects, acquires and integrates data for analysis. Develops data hypotheses and methods, trains and evaluates analytics models, shares insights and findings and continues to iterate with additional data.
SCTY Level 5 Provides advice and guidance on security strategies to manage identified risks and ensure adoption and adherence to standards.
Obtains and acts on vulnerability information and conducts security risk assessments, business impact analysis and accreditation on complex information systems.
Investigates major breaches of security, and recommends appropriate control improvements. Contributes to development of information security policy, standards and guidelines.
DATM Level 5 Devises and implements master data management processes, including classification, security, quality, ethical principles, retrieval and retention processes.
Derives data management structures and metadata to support consistency of information retrieval, combination, analysis, pattern recognition and interpretation, throughout the organisation.
Plans effective data storage, sharing and publishing within the organisation.Independently validates external information from multiple sources.
Assesses issues which might prevent the organisation from making maximum use of its information assets.