Analyst, Security Monitoring

at IHS Towers
Location Lagos, Nigeria
Date Posted August 12, 2021
Category Management
Job Type Full-time
Currency NGN

Description

Job Description

  • We are currently recruiting for an Analyst, Security Monitoring who will contribute to overall reduction of information security (IS)-related incidents and compliance to statutory / international / organization specific standards by coordinating internal and third-party resources for continuous monitoring and identification of threats to end-user applications, networks, systems, and other access routes to other assets (including prevention/ detection, email/ spam filtering, web filtering etc).

Key Roles & Responsibilities

  • Ensure intelligent reporting and fine-tuning of Security Information and Event Management (SIEM) solution, File Integrity Monitor (FIM), Network Access Control (NAC), Database Activity Monitor (DAM), Endpoint Security Solution (Antivirus), Privilege Access/Identity Manger (PAM/PIM), Firewalls and Security Operations Centre (SOC) rules.
  • Identify and ensure that sufficient trails are maintained, retained and retrievable for forensic analysis and investigation on security solutions and applications monitored.
  • Identify and Implement required logging policies across different layers of systems and across enterprise platforms monitored.
  • Identify intelligent alerting to be created on security solutions, based on risk scenarios.
  • Implement and manage log retention policy across multiple platform and systems.
  • Review logs/ alerts (closed-opened) and reports of all in-place security and infrastructural devices.
  • Perform ad-hoc and designated security and compliance reporting.
  • Track security alerts and events and log same on ticketing solution.
  • Network with other internal organizations to ensure coordination of compliance efforts.
  • Participate in the creation and review of enterprise security policies, standards, and baselines.
  • Provide support for the monitoring team as well as security incident and events management solution logging requirements and integration.
  • Keep abreast of new/revised or improved security solutions, processes and development of new threats and attack vectors.
  • Keep abreast of SOX regulatory standards.
  • Participate in the deployment of tested security patches and updates.
  • Conduct security tool selection, pilot, and implementation.
  • Ensure intelligent monitoring and reporting on SOX applications.
  • Identify, investigate, and resolve security breaches detected by installed security solutions.
  • Make suggestions to implement projects that increase security and ensure the highest quality of service and security monitoring.
  • Perform other functions as assigned by the line manager or unit head.

Experience & Qualifications Required

  • Bachelor's and / or Advanced Degree in Computer Science or any related discipline.
  • +2 years’ relevant experience in Information Security or any Information Risk/Control/Audit role, with at least 1 year in security monitoring and solutions deployment.
  • Experienced in monitoring and correlating incidents and events noted from disparate security solutions.
  • Knowledge of SOX security monitoring requirements and reporting.
  • Demonstrate knowledge in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
  • Demonstrate knowledge with network security and networking technologies as well with systems, security, and network monitoring tools.
  • Demonstrate knowledge with web-related technologies (web applications, web services, service-oriented architectures), and network/ web-related protocols.
  • Demonstrate knowledge of security monitoring frameworks or standards.
  • Understand the latest security principles, techniques, and protocols.
  • Problem solving skills and ability to work under pressure

Organizational Competencies:

  • Be Bold
  • Customer Focus
  • Innovation
  • Integrity

Functional Competencies:

  • IT Operations
  • Incident Management
  • Security Assessments
  • Security Monitoring & Reporting
  • Log Analysis and Correlation.
  • Continuity & Disaster Recovery
  • Business Communication
  • Security Solutions Deployment
  • Vulnerability Lifecycle Management

Behavioural Competencies:

  • Collaboration & Teamwork
WARNING: Do not to pay any money to get a job. Please report fraudulent jobs to info@joblinks.ng