Monitor cyber information, events, alerts, and ticketing queues to identify security events and threats across multiple technologies to ensure security incidents are identified timely.
Proactively research and maintain a proficiency in current and emerging threats, vulnerabilities and security technology developments.
Evaluate and utilise intelligence for new threats and vulnerabilities to ensure protective monitoring is capable of detecting potential new attacks.
Provide assurance of security posture through monitoring security system status.
Respond to tickets and incidents as assigned.
Support the incident and problem response process through to closure.
Act as Level II SME escalation; work with internal and external individuals in preparation and when necessary remediation / suppression.
Support, maintain, and tune security tooling and systems as assigned.
Support and maintain operational procedures and documentation.
Ensure timely accurate communications of alerts to stakeholders responding to escalations, or will escalate if required as per the agreed processes.
Work collaboratively with BIS teams to position information security as a key enabler within each service area.
Make recommendations of counter-measures, mitigating controls, best practice configuration and processes to improve operational effectiveness and efficiency within security operations Proactively support the secure delivery of BIS strategies and delivery objectives.
Technical Knowledge, Skills and Abilities :
Minimum four-year degree specific to information / cyber security or equivalent experience.
Minimum two+ years hands-on firewall administration preferably in a SOC environment.
Professional information security certifications such as CompTIA Security+, CISSP, CISM, CCNA Security, CCNP Security, CEH, GIAC, or CISA required.
Excellent communication skills with the ability to engage with a variety of different people.
Strong analytical skills and problem-solving capabilities with attention to detail.
Ability to work well with others, with an emphasis on virtual teams across multiple time zones.
Recognise an respond to potential, successful, and unsuccessful cyber-attacks and compromises thorough reviews and analyses of relevant event detail.
Subject matter expertise in multiple security technologies and across the cyber security body of knowledge Planning and Decision Making :
Suggests decisions guided by internal policies in non-standard situations.
Assists technical projects or programmes with moderate resource requirements, risk and / or complexity. Verify customer needs;
assesses requirements. Impact and Scope :
Explains concepts to internal colleagues to adopt a different point of view.
Assists with successful implementation of processes and policies aimed at continuous
Impacts the achievement of customer, operational, or project objectives Acts to ensure return on investment is achieved.