View Our Website View All Jobs

IT Security Analyst (385686)

Basic Function

The IT Security Analyst III position applies mid-level principles in the collection and moderate to complex analysis of research, evaluation, deploying, managing, administering, auditing and monitoring of company IT systems in an effort to manage risk.   IT Security Analysts are on the “front lines” of security operations.  This position has the responsibility for ensuring that security tools are appropriately deployed and are running optimally.  Incumbents constantly monitor the environment for signs of trouble and are often the first point of contact when a high-risk alert is issued or a suspected attack begins to affect business operations.  IT Security Analysts also typically conduct the initial stages of a forensics investigation. Candidate will be part of an Information Security Governance, Risk, Compliance function that is responsible of governing all activities necessary to design, develop and manage implementation of Information Security program including controls, processes, and standards that satisfy the cybersecurity requirements of the organization and the business. This role ensures the implementation and monitoring of cybersecurity direction, strategy and design with regards to Aramco Services Company (ASC) infrastructure.

Duties & Responsibilities

  • Manage and execute cybersecurity strategy, roadmap, and organizational model
  • Endorse enterprise and technical security architectures
  • Manage Active Directory and Access Management for users
  • Evaluate and assess information security program, solutions, and organizational posture
  • Execute tasks across a wide portfolio of projects offering security design advice and guidance
  • Manage and execute Information Security roadmap
  • Perform business risk analysis, security benchmarking and oversee key performance indicators (KPIs)
  • Perform compliance assessments and Gap analysis between Information Security requirements
  • Capture and develop best practice processes and methodologies to assist implementations and drive operational excellence
  • Advise leadership on Information Security issues, systems, processes, products, and services
  • Review and provide advice on existing performance measurement strategy for ongoing Information Security Programs
  • Implement performance measurement strategies for Information Security projects and programs
  • Develop Information Security reports for management
  • Responsible for managing GRC process automation tools such as Archer or others
  • Research, evaluate, and deploy new technologies while remaining budget conscious
  • Conduct risk assessments on proposed and existing systems
  • Work to balance the needs of applying security controls in line with corporate guidelines and not imposing overly restrictive processes that hamper employee productivity or business partner interactions
  • Maintain, enhance, and support existing computer applications and systems
  • Troubleshoot system problems and implement resolutions
  • Develop necessary documentation per established standards
  • Adhere to Service Level Agreement, if exists, when supporting customers
  • Train and mentor newly hired Assistant IT System Analysts
  • Train and orient customers on systems and products
  • Evaluate and test off-the-shelf products to ensure their applicability to corporate business requirement
  • Review and analyze user requests for computer and communication systems, and recommend optimum solutions to meet customer requirements
  • Manage data center facilities infrastructures, and support relevant upgrade projects
  • Analyze and approve changes to computing infrastructure, systems and application
  • Adhere to security and safety regulation and rules
  • Perform support to operations monitoring of IT systems and problems response and resolution
  • Conduct assessment and classification of Event of Interests for business applications or IT installations in well-defined areas
  • Perform vulnerability scanning, penetration testing, compliance monitoring, intrusion detection, etc.
  • Investigate suspected attacks, hacking activities and breaches of IT Information Risk policies, and recommend remedial action in accordance with the Group’s Information Risk Incident Management Process (IRIMP) and procedures
  • Investigate and understand possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, etc. and possible abnormal activities, such as worms, Trojans, viruses, etc.
  • Perform front line, Tier 1 triage, routing and tracking of a variety of security related inquiries, incidents and other issues
  • Review security events generated by a variety of network and/or host based security appliances (Firewalls, NIDS, HIDS, Event logs, etc.) and determine correct remediation actions and escalation paths
  • Perform other duties and responsibilities as assigned

Education and Experience

  • Bachelor’s degree program in a technical field such as Computer science, Management Information Technology (MIS), Engineering, and Mathematics is strongly preferred, may consider candidates with technical school training or military training and seven (7) years’ experience or HS/GED candidates with ten (10) years’ work experience with a working knowledge of LAN systems and the maintenance and upkeep requirements of an information management system in lieu of Bachelor’s Degree
  • Five (5) year’s work experience in computing environment or Data Networking fields required; 10 years of Information Technology and 3-5 years experience in Information Security preferred
  • Minimum of five years of experience working in a medium-large corporations preferred
  • Experience on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC)
  • Experience with Anti-Virus, Intrusion Detection Systems, Firewalls, Active Directory, Vulnerability Assessment tools and other security tools found in large network environments; along with experience working with Security Information and Event Management (SEIM) solutions
  • Familiarity with various network and host-based security applications and tools, such as network and host assessment/scanning tools, network and host based intrusion detection systems, and other security software packages
  • Digital Media Analysis (DMA) and prior computer forensics experience strongly desired, but not required.
  • Knowledge on managing Active directory and Identity Access managements systems
  • Knowledge of frameworks such as NIST CSF, ISO27001, SABSA, TOGAF
  • One or more certifications in COBIT 5, ITIL, CGEIT
  • One or more certifications in CISA, CISM, CISSP, CCDP, and ISO Lead Auditor /Implementer
  • Two or more certifications in CEH, CCNA, CWNA, Certification from SANS
  • Profound experience in project management, performance measurement and reporting in the field of Information Security
  • Strong understanding of Security architecture and how it fits into the overall Enterprise architecture
  • Very Strong Interpersonal Skills, verbal, and written communication skills
  • Strong business skills
  • Good analytical and problem-solving skills.
  • Ability to work as a member of a multi-disciplined, cross-functional and collaborative team environment
  • Ability to understand end-to-end IT operations and able to recognize dependencies and variables throughout the process
  • Experience with a variety of operating system experience, Windows/Linux/Unix in a functional capacity
  • Security and/or Networking experience and understanding in the following:
    • Working knowledge of general security methodologies, concepts and terminologies
    • Basic routing principles and networking fundamentals
    • Well known protocols and services (FTP,HTTP,SSH,SMB,LDAP)
    • Packet Analysis Tools (TCPDUMP, Wireshark, Ngrep)
    • Knowledge/Experience with McAfee Nitro SIEM, McAfee ePolicy Orchestrator “ePO”, SourceFire IPS, Juniper/Palo Alto Firewalls, and EnCase Enterprise is desired, but not required
  • Must have familiarity with TCP/IP services or networks and have a passion and interest for technology as well as desire to learn more about security related platforms and malcode analysis
  • Must possess good work habits, a strong work ethic, and be able to adhere to company work hours, policies, and standard business etiquette
  • Must exemplify strong analytical skills, consensus building and strong collaboration skills are crucial


Read More

Apply for this position

Apply with Indeed
Attach resume as .pdf, .doc, or .docx (limit 5MB) or Paste resume

Paste your resume here or Attach resume file