Security Analyst

Independent Electricity System Operator
Hybrid

About The Position

The Security Analyst, under the direction of the Supervisor, Security Architecture and Risk, will be part of the team responsible for IESO's information security architecture, threat and risk assessment, and vulnerability management programs. They will participate with project teams as an InfoSec subject matter expert throughout the project lifecycle. Working with various IESO teams, they will collect data, analyze information, and conduct threat and risk assessment reports on projects, IT procurements, and vendor risk assessments.

Requirements

  • Requires a sound knowledge of computer science, information technology and telecommunications systems.
  • Good written and oral communication skills, in order to deal with end-users, review/input on procedures, standards and/or methods; and design/deliver training.
  • This knowledge is considered to be normally acquired either through the successful completion of a university degree in the area of Computer Science or related discipline or equivalent.
  • Experience in conducting threat and risk assessments.
  • Experience coordinating/analyzing enterprise security systems, or components of the security program, on a diverse set of computing platforms, operating systems and applications, especially Windows NT and UNIX.
  • Experience with networking products, large package and systems implementation. Previous experience as part of a large multi-disciplined project, and with systems vendors, which requires having sound project management skills
  • A period of over 4 years, up to and including 6 years is considered necessary to gain this experience.

Responsibilities

  • Oversee/monitor access logs and privileges.
  • Contribute to the development of Information Security standards and procedures for business units consistent with corporate security objectives and generally accepted and leading edge Information Security practices and professional security standards and in coordination with IT Process Development Leaders and the Senior Manager, Information Security.
  • Support the delivery of the Security Operations and Technology programs for applications, tools, anti-virus, encryption and fire walls, implementation support, identification of system vulnerabilities, User and Entity Behaviour Analysis, system assessments, Information Security advice and consultation, business resumption planning and disaster recovery planning.
  • Provide input to supervision on all areas of Information Security.
  • Contribute to the development/delivery of awareness training and general Information Security education.
  • Provide strategic, operational, and technical insight to ensure the IESO Security program is adequately prepared to detect current and future threats
  • Review and modify, in conjunction with the Threat/Risk and Governance Teams, the security technology rules and filters to better detect and prevent security incidents. As part of this change, formal review and documentation of the change will need to take place to prevent outages or detrimental system impact
  • Create and implement the automation routines and information collection and identification tools for security correlation purposes
  • Identification and formally revie redundant monitoring tasks, redundant security event analysis or data duplication on collection tasks to streamline and free up system resources. Where “Reduction” occurs documentation will need to be developed explaining the proposed solution
  • Monitor and ensure Service Provider is empowered to review the security data feeds among the various servers, applications and networks within relevant processes
  • Document and review with other SOC analysts at the Service Provider the interactions of the filters, rules and matching routines and security applications within the deployed security technologies.
  • Assist, through strong documentation and communications skills, the Service Provider SOC analysts in explaining the solutions that were developed, designed and implemented to security operations and non-security operations personnel
  • Keep up-to-date on the latest security information pertaining to the SOC technology in order to validate the security capabilities of the SOC
  • Keep up-to-date on the vulnerability of appliances, servers, OS, application, etc. of the SOC
  • Conduct the installation, operation and management of approved security tools and applications to provide security information, security event relationship and security event analytical tools for the SOC analysts
  • Participate in improvement efforts to gather, analyze, and define security operations and information security requirements for a variety of threat and vulnerability management issues
  • Perform product evaluations and recommendations. The analyst may be asked to choose security products and services to implement, and plan the implementation based on industry best-practices or procedures in relationship to the SOC
  • Develop, document, and present general and technical presentations
  • First point of contact from Service provider during business hours.
  • Provide leadership and insight for the security monitoring and security incident investigation and response personnel
  • Handle confidentiality issues, requiring high level of trust and integrity
  • Perform other duties/tasks/projects as required or assigned.

Benefits

  • Best-in-class benefits and long-term support in the form of a defined benefit pension plan.
  • Work in a dynamic and evolving sector that offers exciting opportunities and the chance to explore new career paths.
  • Leadership that values meaningful discussions, welcomes feedback, and prioritizes career development.
  • A strong, inclusive culture and a collaborative team environment with a shared passion for impactful work.
  • Compensation packages that are regularly reviewed to remain competitive and to best accommodate the diverse needs of our employees.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service