You are viewing a preview of this job. Log in or register to view more details about this job.

Cyber Security Analyst


ROLE: Cyber Security Analyst

Responsibility:

· Understanding on OSI network model and network protocols such as TCP/IP
· Keeping up to date with the latest security and technology developments
· Network packet analysis, Network traffic and log analysis
· Understanding of TCP/IP, computer networking, routing and switching
· Knowledge on Windows, UNIX and Linux operating systems
· Malware analysis and forensics investigation
· Understanding/ differentiation of intrusion attempts and false alarms
· Firewall and intrusion detection/prevention protocols
· Understanding architecture, administration and operating systems
· Coding skills and knowledge (C, C++, Java)
· Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
· Investigate security alerts and provide incident response
· Liaise with stakeholders in relation to cyber security issues & provide recommendations
· Use advanced analytic tools to determine emerging threat patterns and vulnerabilities
· Assist with the creation, maintenance and delivery of cyber security awareness training
· Research/evaluate emerging cyber security threats and ways to manage them
· Test new security products, perform testing, design new security systems and run upgrades
· Comprehensive knowledge of application vulnerability management identification, analysis, metrics and reporting tools as well as processes enabling proper governance, risk and compliance.
· Assist in defining and continually improving vulnerability risk management requirements for global IT support organizations.
· Establish relationship with internal and external customers and partner with them to monitor and maintain security controls across corporate and business applications and devices.
· Interact with customers or other stakeholders to aid in the resolution of vulnerabilities that have been identified.

Required Technical Skills:
· Security Governance
· Risk and compliance
· Threat, risk analysis and mitigation
· Networking, malware analysis
· Vulnerability Assessment
· Security events monitoring
· System Administration (Windows, Linux, Unix, MacOS, iOS)
· Authentication/Access Controls


Best regards,
Sutharshine Shanmugam 
HR Talent Acquisition Group
Overseas Hiring & Digital Transformation Practice
Tata Consultancy Services
Mail to: sutharshine.shanmugam@tcs.com
Website: http://www.tcs.com