This job is expired
Telco Security Analyst
Dialog
| 2024-07-24
The Cyber Security Analyst will play a crucial role in safeguarding our telecommunication network and IT infrastructure by analyzing emerging cyber threats, researching the impact of new technologies, and implementing effective security measures. This role is ideal for individuals with 1-2 years of experience in cybersecurity or fresh graduates who are willing to pursue a career in cybersecurity.
Key Responsibilities:
Vulnerability Assessments:
Be part of a team that conducts vulnerability assessments that include penetration testing and code analysis to identify security threats.
Develop mitigation plans in collaboration with stakeholders.
Cyber Threat Analysis:
Analyze emerging cyber threats based on vulnerability assessments and recommend appropriate countermeasures.
Telecommunication Network Security:
Understand the architecture of the telecommunication networks, integrations and interconnections, services offered, and technology evolution to identify threats and risks.
Implement necessary controls to safeguard the network.
Cybersecurity Controls Implementation:
Assist in implementing cybersecurity controls, improvements, and tools as per the organization’s roadmap.
Maintain and update security measures regularly.
Automation:
Take actions to automate routine and manual work to enhance efficiency.
Development Initiatives:
Participate in various in-house development, proof of concept, and prototyping initiatives related to cybersecurity.
Incident Response:
Respond to security events, incidents and participate in forensic investigations.
Implement countermeasures and recovery activities as necessary.
Collaboration:
Work closely with asset owners, subject matter experts, vendors, and cybersecurity professionals within sister companies and corporate headquarters.
Be a team player, contributing to a positive team environment and collaborating effectively with colleagues.
Compliance and Policy Adherence:
Ensure adherence to cybersecurity policies, standards, and regulatory requirements.
Technological Impact Research:
Research how new technologies and trends such as artificial intelligence and quantum computing impact the cybersecurity landscape on both offensive and defensive fronts.
Stay updated with the latest cybersecurity trends, tools, and best practices through continuous learning and professional development.
Provide recommendations for risk mitigation.
Documentation:
Maintain detailed documentation of security assessments, incidents, and response activities.
Not available