Job Summary:
We are seeking a proactive and skilled Security Analyst to join our cybersecurity team. In this role, you will implement and maintain a robust security architecture blueprint covering DevSecOps, applications, infrastructure, and operational security. You will engage in vulnerability scanning, manage access controls and SIEM tools, and support auditing processes while maintaining high standards in security operations.
Key Responsibilities:
Security Architecture and Access Management:
· Design and implement security architecture blueprints to support secure interactions between applications and systems.
· Define processes, provisioning, and interfaces, providing actionable recommendations to enhance security.
· Manage and enforce access control policies across the environment.
Vulnerability Scanning and Issue Resolution:
· Conduct and engage in security vulnerability scanning activities, including HCR, NVA, Pen Testing, SAST, and DAST.
· Analyse findings and implement effective resolutions.
Security Operations Management:
· Oversee and operate tools such as Access Management and SIEM (e.g., IBM Security Verify Access, IBM Qradar).
· Facilitate external auditing processes and ensure compliance with regulatory standards.
Operational Security Processes:
· Perform OS-level and application-level patching to address vulnerabilities.
· Implement and follow procedures for server and application hardening.
· Execute security incident detection, reporting, and resolution processes.
· Manage SSL certificate renewals and operational housekeeping tasks.
Technologies & Tools:
· OS Administration (Linux / Windows)
· IBM Security Verify Access
· IBM Qradar
· Thales HSM
· OpenSSL
· Vulnerability and Penetration Testing Tools (e.g., Tenable Nessus, Burp Suite Enterprise)
Required Skills and Qualifications:
Must-Have Skills:
Experience:
· Minimum 2+ years of experience in IT Security.
Certifications:
· Preferably certified in CISSP, CCSP, CCSK, or equivalent certifications.
Cybersecurity Expertise:
· Hands-on experience in at least 1-2 areas of cybersecurity domains such as Identity Access Management, Security and Risk Management, Application and Network Security, and Vulnerability Management.
· Broad understanding of other cybersecurity domains.
Good-to-Have Skills (Optional):
· Experience planning and executing SSAT, Security Compliance Checks, DAST, and SAST activities.