Position
Analyst - Security Operations
Department
Information Technology
Working Location
Macau Peninsula
Post Date
16/09/2024
Requirements
• Degree holder in Computer Science, Electrical / Electronic Engineering, Information Technology related fields or Cyber Security related experience is a minimum
• CISSP / CISP / CCNA / CISA / GCIH / ECIH (or other industry recognized security certification) is strongly preferred
• Minimum of 2 years of relevant experience in Information Technology
• Experience in End-Point Security, System Security, Network Security and Security Incident Handling
• Experience in security log monitoring
• Hospitality or gaming industry experience is preferred
• Require to work on shift
• Knowledge in information, data, network and cyber security technologies
• Knowledge of IT infrastructure including multiple operating systems and basic system administration skills
• Proficient in spoken and written English and Chinese
• Good presentation skill and able to explain technology strategic to non-IT use
Responsibilities
• Continuously monitoring, analyzing, triaging and reporting on security event/alerts, including investigation of anomalous network activity and responds to cyber incidents
• Perform event correlation, trend analysis of security logs, network traffic, security alerts, events and incidents
• Ensure that security alerts are correctly handled, reported and documented in accordance to SOP
• Continuously work on fine-tuning security tools to minimize false positives and maximize detection and prevention effectiveness
• Prepare daily security reports for upper level management review
• Monitor healthiness of security tools for company
• Collect security alert context and details required for escalating to Senior Analyst
• Strictly follow all company Cyber Security policies, standards, procedures, and will also act as a first tier support to remind all company employees to follow
• Maintain Security Information and Event Management (SIEM) solution
• Respond to security alert and request from users
• Handle security event or incident, assist on security threat analysis and research
• Offer all the necessary support to Cyber Security initiative through predictive and reactive analysis
• Integrate valid Indicator of Compromises (IOC)s and threat intelligence into the detection / prevention measures