US Jobs US Jobs     UK Jobs UK Jobs     EU Jobs EU Jobs

   
This job has been posted for more than 30 working days and has expired.

Senior Information Security Analyst / Specialist - Wolverhampton

Senior Information Security Analyst / Specialist - Wolverhampton
£40-48,000pa plus truly excellent benefits & bonus


As a Senior Security Analyst, your role on the team will include leveraging your knowledge of industry best practices, good judgment and problem solving skills to execute security operations.

You will be reporting directly to the IT Security Manager and be expected to support him in his role and be prepared to deputize for him when required.

Strong written and verbal communication skills are essential as is the ability to communicate well with Business stakeholders.

You should be analytical with the ability to identify and define problems or risks; determine probable causes and recommend appropriate solutions.

In return you will receive a competitive salary & benefits, and be part of a team that encourages individual ideas and innovation and which is integral in supporting the business through its exciting, on-going transformation and growth.

We are looking for someone who is committed to the long term and we value loyalty and a desire to be part of something special.

In this position you will:
- Provide security monitoring for a growing environment; support incident responses and provide root cause analysis support for incidents.
- Review aggregated server logs, firewall logs, intrusion prevention logs, and network traffic for unusual or suspicious activity.
- Provide Information Security Reporting and Metrics and provide input into improving information security reporting and metrics; identify/recommend improvements on internal investigation capabilities via tool building.


- Provide assistance in recovering from security breaches; participates in investigation and remediation of security incidents this may include working as part of a team, performing deep-dive incident analysis and determining if critical systems or data sets has been impacted.


- Establish configuration policies for security technologies.


-