Threat Information Security Analyst
11 hours ago
Continuously monitor and tuning threat management systems used to identify, detect and properly respond to unknowns or alerts triggers. Reconcile threats from multiple data sources, setting event thresholds and updating signatures/sensitivity.
Research, analyze, test, develop, install, program and implement computer, data and information security controls, interfaces, utilities, programs as well as audit tools that are used to control, manage, protect and monitor information systems and applications across the company.
Use network, application and open source vulnerability scanning tools along with manual testing to identify vulnerabilities.
Discussing vulnerabilities/risk with business owners/team members to assist them in working through the remediation process.
Review/investigate/correlate system logs from a variety of internal and external sources. Monitor audit trails and access on a regular basis for indications of attacks or inconsistencies.