We are looking for a Identity Defense analyst on a 12 months extendable contract basis.
You must have expereince in cloud security operations, conducting analysis/investigation and containment of potential data breaches or cyber security incidents.
Description:
- An Identity Defense analyst is accountable for researching, designing, engineering, implementing, and supporting solutions to prevent and detect anomalous use of accounts.
- The Identity Defense Specialist will support design efforts to build out new processes, controls, and supporting governance related to implementation of human and non-human account monitoring to protect.
- You will utilize in-depth technical knowledge and business requirements to help implement scalable solutions, inclusive of monitoring, alerting, and escalation frameworks focused on core account protections.
- Leveraging your knowledge of both common and emerging threats related to account take-over, you will have an opportunity to proactively develop, implement, and influence controls and policy within the digital identity domain.
- You will partner with leaders from line of business organizations to triage security events and report on impacting security incidents.
- The Analyst will regularly collaborate with experts in and out of our team, both in country and in other regions, so excellent communication skills are very important.
- The role will also involve discussion with employees as part of alert analysis and disposition.
- Build and monitor Splunk alerting and dashboards.
- Identify areas for further process automation, simplification, and improvement.
- Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.
Risk management. - Comprehensively document analysis, investigative activities
Required Skills/Qualifications:
- 3+ years of experience with cloud information security related activities.
- 3+ years of experience in an operations focused cloud information security role.
- Experience conducting analysis/investigation and containment of potential data breaches or cyber security incidents.
- Ability to analyze data and evaluate relevance to a specific incident under investigation.
- Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.
- Ability to exercise independent judgment when responding to alerts.
- Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.
- Familiarity with security vulnerabilities exploits and hacker techniques.
- Familiarity identity management standards, social engineering TTPs, and the incident response lifecycle.
- Familiarity with Splunk, and the ability to build queries, alerts, dashboards, etc.
- Knowledgeable of current authentication-based exploits.
Argyll Scott Consulting Pte Ltd