Information Protection Analyst

Job Category: /

Sadara Chemical Company

Information Protection Analyst Jobs in Saudi Arabia

Job Purpose:

The main purpose of the Information Protection Analyst is to perform the assigned jobs under one of the following functions:

Access Management.
Security & Vulnerability Management.
Security Intelligence Center.

Functional Duties:

The main responsibilities of the Information Protection Analyst is to perform his duties under one of the following IT Information Protection sections:

Access Management.
Security & Vulnerability Management.
Security Intelligence Center.
Also, will be responsible and accountable on the following activities:

Identifies, analyzes, monitors, mitigates and manages threats and vulnerabilities to IT systems and networks.
Apply service-oriented security architecture principles to meet the organization’s confidentiality, integrity and availability requirements
Uses defensive measures and multi-source information to report events and respond to incidents.
Uses data collected from cyber defense tools to analyze events that occur within the organization to detect and mitigate cyber threats.
Ensure all systems security operations and maintenance activities are properly documented and updated as necessary.
Tests, implements, deploys, maintains and administers hardware and software that protect and defend systems and networks against cybersecurity threats.
Manages individuals and entities identities and access to resources through applying identification, authentication and authorization systems and processes.
Ensure identity access management implementations follow organization’s standards and policies.
Performs vulnerability assessments of systems and networks. Identifies where they deviate from acceptable configurations or applicable policies. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
Collects and analyzes digital evidence, investigates cybersecurity incidents to derive useful information to mitigate system and network vulnerabilities.
Identifies, collects, examines and preserves evidence using controlled and documented analytical and investigative techniques.
Collects and analyzes multi-source information about cybersecurity threats to develop deep understanding and awareness of cyber threats and actors’ Tactics, Techniques and Procedures (TTPs), to derive and report indicators that help organizations detect and predict cyber incidents and protect systems and networks from cyber threats.
Proactively searches for undetected threats in networks and systems, identifies their Indicators of Compromise (IOCs) and recommends mitigation plans.
Designs and oversees the development, implementation and configuration of cybersecurity systems and networks.
Ensure that protection and detection capabilities are aligned with the organization’s cybersecurity strategy, policies and other related documentation.

Education:

Essential: Bachelor’s degree in computer science, Engineering, Cybersecurity or any related field.

Professional Qualifications:

Preference: Cybersecurity Professional Certification, such as Security+, CISSP, CCNA Security or CEH.

Tagged as: ,

Upload your CV/resume or any other relevant file. Max. file size: 5 MB.