At a Glance
- Tasks: Manage security tools and assess information security risks for our customers.
- Company: Join Cubic, a leader in transportation systems with a focus on security.
- Benefits: Enjoy competitive pay, flexible working options, and opportunities for professional growth.
- Why this job: Be a key player in safeguarding information and making a real difference.
- Qualifications: Experience in security operations and a degree in a numerate subject required.
- Other info: Dynamic work environment with potential for career advancement.
The predicted salary is between 36000 - 60000 ÂŁ per year.
Job title
Security Analyst
Company
Cubic
Job description
Business Unit: Cubic Transportation Systems
This role will manage security tools as a service provider to our customers. The Security Analyst will be required to manage and report operational information security risk, using IT security tools and processes. Assist customer service and IT teams to manage the outputs of security systems. Act as a trusted expert partner to advise service teams and managers regarding operational service calls, incidents and problems, and provide awareness.
Job Details:
Essential Job Duties and Responsibilities
- Recognises, investigates and reconciles violation reports and logs generated by detection systems in accordance with established procedures and security standards. Examples include but are not limited to responding to and reporting from automated alerting systems, auditing logs, IDS/IDP logs, anti-virus and firewall systems.
- Installs, manages and improves technical security control tools. Interviews minor offenders and compiles reports and recommendations for management follow-up.
- Creates and delivers user documentation and security awareness literature and training
- Assists in the assessment of the potential impact on existing access security mechanisms of specific planned technical changes, in order to help ensure that potential compromise or weakening of existing security controls is minimised. Also assists in the evaluation, testing and implementation of such changes.
- Ensures that co-ordination and change control are applied to technical specifications and to the technical infrastructure.
- Conducts risk assessments and security control reviews for all types of business applications and computer installations and recommends appropriate action to management.
- Assists internal and external customers defining their needs for new access rights and privileges.
- Provides input to other information security, contingency planning and related activities.
- Some manual handling may occasionally be required. May be required to work on other Cubic sites and data centres.
- Comply with Cubic’s values and adherence to all company policy and procedures. In particular comply with the code of conduct, quality, security and occupational health, safety and environmental policies and procedures.
- In addition to the duties and responsibilities listed, the job holder is required to perform other duties assigned by their manager from time-to-time, as may be reasonably required of them.
Minimum Job Requirements
Skills knowledge and experience
Essential
- Experienced practitioner in security operations or development roles.
- Sound knowledge of change and configuration management, reliability and safety methods and the use of metrics.
- Practical knowledge of information security and technologies
- Significant experience in an IT environment
Desirable
- Experience within organisations compliant with or seeking ISO 27001 / PCI-DSS compliance
- Experience of quality management systems e.g. ISO 9001
- Understanding of security within agile and waterfall project methods
- In depth understanding of IT security control tools, e.g. ArcSight, Splunk, Qualys, Nessus, Tripwire, OSSec, Cisco IPS, McAfee, IBM Guardium, Centrify, Barracuda WAF
Education and qualifications
Essential
- A university degree in a numerate subject (e.g. computer science, maths, engineering, science)
- Current driving licence
Desirable
- Certification as an Information Security professional (e.g. IISP/CISA/CISM/SSCP/ CISSP/ ISA)
- IT vendors’ certifications
- ITIL v3/ Prince2 foundation level/ TOGAF 9
Personal Qualities
- Must be able to work effectively and uphold professional standards and confidentiality with Cubic internal and external customers as well as staff at all levels of the organisation. The role will also be required to work with security vendors, Cubic suppliers and customers.
- Self-motivated
- Able to work on own initiative, unsupervised
- Attention to detail and adherence to procedures
- Strong customer service skills
- Strong verbal and written communications skills
- Ability to learn on the job
- Able to support an “on-call” out-of-business-hours service on a rotating basis with this responsibility spread across team members
The description provided above is not intended to be an exhaustive list of all job duties, responsibilities and requirements. Duties, responsibilities and requirements may change over time and according to business need.
Location: Stockton-on-Tees, County Durham
Job date: Fri, 26 Jan 2024 08:58:58 GMT
Note: To help us track our recruitment effort, please indicate in your email/cover letter where you saw this job posting.
#J-18808-Ljbffr
Security Analyst employer: Cubic
Contact Detail:
Cubic Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Analyst
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and connect with current employees at Cubic. A friendly chat can sometimes lead to job opportunities that aren't even advertised!
✨Tip Number 2
Show off your skills! Prepare a portfolio or case studies showcasing your experience with security tools and risk management. This will help you stand out during interviews and demonstrate your hands-on expertise.
✨Tip Number 3
Practice makes perfect! Conduct mock interviews with friends or use online platforms to refine your responses. Focus on articulating your experience with IT security tools and how you've tackled challenges in past roles.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets noticed. Plus, it shows you're genuinely interested in joining the Cubic team. Don’t forget to mention where you found the job posting!
We think you need these skills to ace Security Analyst
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Security Analyst role. Highlight your experience with security tools and any relevant certifications. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about security and how your background makes you a great fit for our team. Keep it concise but impactful!
Showcase Your Technical Skills: Don’t forget to mention your hands-on experience with IT security tools like Splunk or Nessus. We love seeing practical knowledge, so be specific about your achievements in previous roles.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to track your application and ensure it gets the attention it deserves. Plus, it’s super easy!
How to prepare for a job interview at Cubic
✨Know Your Security Tools
Familiarise yourself with the specific security tools mentioned in the job description, like ArcSight, Splunk, and Nessus. Be ready to discuss your experience with these tools and how you've used them in past roles.
✨Understand Risk Assessment
Brush up on your knowledge of risk assessments and security control reviews. Prepare to explain how you would conduct these assessments and what factors you consider when recommending actions to management.
✨Showcase Your Communication Skills
Since strong verbal and written communication skills are essential, practice explaining complex security concepts in simple terms. You might be asked to create user documentation or deliver training, so demonstrate your ability to communicate effectively.
✨Demonstrate Problem-Solving Abilities
Be prepared to discuss specific incidents where you recognised, investigated, and reconciled security violations. Use the STAR method (Situation, Task, Action, Result) to structure your answers and highlight your problem-solving skills.