Security Analyst supporting delivery of managed security services for higher education clients at Asiera. Responsibilities include incident management, threat hunting, and collaboration with multiple teams.
Responsibilities
The Security Analyst will support the delivery of managed security services to our higher education clients.
Reporting to the Security Operations Manager the Security Analyst will work closely with the Product Team, the Senior Security Analyst and a 3rd party MSSP in delivery of Asiera SOC & SIEM services.
Support the security operations and service delivery to our clients when a client security incident occurs.
Assist the Senior Analyst in managing the security incident on behalf of Asiera, including investigation, threat hunting and issuing client advisories.
Act as a key contributor to aid client resolver groups, providing advice on containment and remediation steps, recovery stage activity, and identifying responsive actions that Asiera can take to manage and reduce threats to constituents.
Be a key contributor in the further development of security platforms, platform integration, and design & development of additional managed security services and service features.
Requirements
Experience working in SOC/relevant IT operations role/relevant degree in computing /cyber security or relevant cyber security certifications
Ability to establish and maintain good working relationships with clients, vendors and other stakeholders
Proven experience investigating ICT/ security incidents, including coordination and communication between multiple resolver groups and involved parties
Good knowledge of the threat landscape
Excellent analytical and problem-solving skills
Excellent communication skills, both written and verbal
Ability to work in a busy work environment, to adapt to changing situations and divergent client environments
Adept at working with both technical experts and security experts on shared goals
Experience working with SIEM, EDR, NDR, Threat Intelligence Platforms (bonus points)
Good knowledge of NIST Security Incident Handling 800-61 (bonus points)
Experience with Threat Hunting (bonus points)
Experience with Splunk SPL (bonus points)
Experience with NetFlow and PCAP analysis (bonus points)
Intern supporting IT Security team at OneDigital with hands - on experience and mentoring. Engaging in real - world assignments and responsibilities within IT Security.
Cyber Threat Intelligence Analyst at AIG specializing in cyber threat research and intelligence production. Collaborating with an interdisciplinary team to enhance cybersecurity situational awareness and reporting.
Senior Cyber Security Analyst protecting customers from cyber threats while enhancing cyber security services at technology firm. Focused on both security operations and technical delivery.
Cybersecurity Analyst assisting in the review and implementation of cybersecurity initiatives across a large environment at Kemper. Responding to cyber threats and improving processes and technologies.
Senior Information Security Analyst managing Information Security Management System at BMLL Technology. Supporting compliance with ISO 27001 and enhancing security measures.
Graduate Cyber Security Analyst at McKesson participating in a 24 - month Cyber Academy program. Monitor security alerts and contribute to incident response efforts while gaining mentorship.
Threat Intelligence Analyst role analyzing cyber threats and providing strategic recommendations. Working with cybersecurity teams at PwC Canada to safeguard client data and systems.
Contract Security Analyst specializing in security operations and incident response for cloud security at Embark. Focus on alert handling, detection engineering, and data loss prevention.
Cyber Security Analyst providing security operations support for USAF Cloud One project. Engaging in incident response and cybersecurity compliance activities within a hybrid environment.
Cybersecurity Analyst responsible for monitoring, analyzing, and responding to security incidents in SOC. Developing detection rules and conducting threat - hunting campaigns within a hybrid work setup.