Intrusion Analyst Job Description Template

We are hiring an Intrusion Analyst to support the security within our organization. In this role, you will assist with planning, implementation, upgrading, and monitoring of security measures to protect our organization’s network and information. The ideal candidate will be skilled in using intelligence-based threat detection strategies to prevent advanced threats, provide 24/7 monitoring, and perform real-time incident validation. They will also drive improvements through research of further threat detection capabilities and initiatives, and by sharing their input with development teams. 

Typical Duties and Responsibilities

  • Develop security measures to protect networks and information from unauthorized modification, destruction, or disclosure
  • Perform incident handling in direct interface with customers and management
  • Analyze anomalous behavior using log data from firewalls, web proxy services, network flow analysis, intrusion detection, and malware analysis tools
  • Investigate incidents and escalate them as needed in accordance with protocols
  • Identify improvements for security operations center processes and tools
  • Monitor current virus reports and update virus protection systems as needed
  • Monitor and regulate use of data files and access to confidential files, systems, and information
  • Document security measures, policies, procedures, and tests
  • Encrypt data and implement firewalls to safeguard confidential information
  • Modify security files to integrate new software, fix issues, or change the access status of individual users
  • Provide leadership and mentoring to junior security team members
  • Provide security training and promote security awareness across interdisciplinary teams
  • Address violations of security protocols with violators to ensure these issues are not repeated

Education

  • Bachelor’s degree in information technology, cybersecurity, computer science, or a related field

Required Skills and Experience

  • 5+ years of cybersecurity or computer engineering experience
  • 4+ years of experience in an SOC environment
  • Experience with Splunk and other security monitoring technology
  • Experience analyzing logs using cybersecurity and data analytics tools
  • Experience designing security solutions in accordance with regulatory guidelines
  • Proficiency with scripting languages
  • Expertise in authentication protocols and telemetries
  • Knowledge of the cybersecurity threat life cycle, attack vectors, and exploitation methods
  • Knowledge of common network protocols
  • Working knowledge of SIEM and incident management solutions
  • Working knowledge of Linux, Windows, and OS X 
  • Working knowledge of client/server architecture
  • Understanding of core cybersecurity technology 
  • Strong analysis and troubleshooting skills
  • Strong written and verbal communication skills

Preferred Qualifications

  • CEH, GCIH, or similar relevant certification
Contact us

Recruit with Nexus IT Group