0% found this document useful (0 votes)
53 views

Job Description

The document outlines the duties and responsibilities of a security monitoring analyst role. Key responsibilities include: 1. Providing 24/7 monitoring and client support to detect and respond to security threats. 2. Monitoring and analyzing security events and incidents related to email threats, malware, and suspicious network activity. 3. Implementing controls and performing disk encryption to safeguard against cyber threats.

Uploaded by

Siyabonga Myeni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

Job Description

The document outlines the duties and responsibilities of a security monitoring analyst role. Key responsibilities include: 1. Providing 24/7 monitoring and client support to detect and respond to security threats. 2. Monitoring and analyzing security events and incidents related to email threats, malware, and suspicious network activity. 3. Implementing controls and performing disk encryption to safeguard against cyber threats.

Uploaded by

Siyabonga Myeni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Certainly!

Here's an edited version of the duties and responsibilities:

Duties and Responsibilities:

1. Delivering 24/7x365 Monitoring and Client Support:


 Provide continuous monitoring and support to clients around the clock.
2. Email Security Event and Incident Monitoring:
 Monitor and analyse security events and incidents associated with email threats. (using
Mimecast and Check Point)
 Implement and manage robust security controls to safeguard against phishing, malware, and
various cyber threats.
3. Antivirus Security Event and Incident Monitoring:
 Monitor and analyse security events and incidents associated with known malware
signatures, patterns, or behaviors on individual endpoints (computers, servers, devices).
 Events may include the detection of malicious files, virus-infected attachments, or attempts
to execute malicious code.
4. Endpoint Detection and Response (EDR) Security Event and Incident Monitoring:
 Monitor alerts for suspicious activities, such as unauthorized access attempts, lateral
movement, or abnormal system behavior.

3. Disk Encryption and Decryption:
 Perform disk encryption and decryption on endpoints using Kaspersky and Sophos Anti-virus.

IDS Monitoring and Analysis:


Monitor and analyze Intrusion Detection System (IDS) alerts through IBM Qradar SIEM.
Reports Compilation:

IT Infrastructure Monitoring:
Monitor Paessler PRTG alerts for IT infrastructure.
Incident Escalation:
Escalate unresolved alerts and incidents, or instances where procedures have failed, to the SOC
Analyst Level 2.

Monitor anti-virus alerts (Eset Protect, Kaspersky, Sophos, and Microsoft 365 Defender) and respond
promptly to any identified threats.

Security Event and Incident Analysis:

Monitor and analyze security events and incidents related to email threats using Mimecast and
Check Point technologies.

Endpoint Patching:
Ensure all endpoints are fully patched within 30 days of the patch release date.

Anti-Virus Maintenance:

Keep anti-virus software up to date with the latest version and pattern files.

Patching Agent and Anti-Virus Agent Oversight:

Ensure that patching agents are fully operational on all endpoints.

Verify the effectiveness of anti-virus agents on all endpoints.

Sophos Central Console Operations:

Create hotspot vouchers on Sophos Central Console.

Perform weekly backups for firewalls using Sophos Central Console for clients.

Reports Compilation:

Compile Active Directory and Daily User Cases Spiked reports using IBM Qradar SIEM.

 Provide continuous monitoring and support to clients around the clock.


 Monitor and analyse security events and incidents associated with email threats using
Mimecast and Checkpoint.
 Implement and manage robust security controls to safeguard against phishing, malware, and
various cyber threats.
 Monitor and analyse security events and incidents associated with known malware
signatures, patterns, or behaviors on individual endpoints (computers, servers, devices).
 Monitor alerts for suspicious activities, such as unauthorized access attempts, lateral
movement, or abnormal system behavior.
 Perform disk encryption and decryption on endpoints using Kaspersky and Sophos Anti-virus.
 Monitor and analyze Intrusion Detection System (IDS) alerts through IBM Qradar SIEM.
 Monitor Paessler PRTG alerts for IT infrastructure.
 Compile reports for weekly and month to provide a comprehensive overview of the security
landscape and it covers key security events, incidents, trends observed, and the effectiveness
of incident response activities.
 Escalate unresolved alerts and incidents, or instances where procedures have failed, to the
SOC Analyst Level 2.
iGuardSA

Certainly! Here's a refined version of your responsibilities:

Provide Continuous Monitoring and Support:


Offer 24/7 monitoring and support to clients, ensuring ongoing vigilance against potential security
threats.
Monitor and Analyze Email Threats:
Analyze security events and incidents related to email threats, ensuring prompt detection and
response to potential risks, utilizing Mimecast, Microsoft Defender, and Checkpoint for
comprehensive threat analysis.
Implement and Manage Security Controls:
Deploy and manage robust security controls to defend against phishing, malware, and diverse cyber
threats.
Analyze Malware Incidents on Endpoints:
Monitor and analyze security events and incidents linked to known malware signatures, patterns, or
behaviors on individual endpoints, including computers, servers, and devices.
Monitor Alerts for Suspicious Activities:
Keep a vigilant eye on alerts for suspicious activities such as unauthorized access attempts, lateral
movement, or abnormal system behavior.
Perform Endpoint Encryption:
Execute disk encryption and decryption on endpoints utilizing Kaspersky and Sophos Anti-virus for
enhanced security.
Generate Daily and Monthly Hotspot Vouchers for Clients Using Sophos:
Create daily and monthly hotspot vouchers for clients using Sophos to facilitate secure and
controlled access to the network.
Perform Weekly Firewall Backup Using Sophos:
Conduct weekly backups for the firewall using Sophos to ensure data integrity and quick recovery in
case of any unforeseen events.
Analyze IDS Alerts through IBM Qradar SIEM:
Monitor and analyze alerts generated by the Intrusion Detection System (IDS) through IBM Qradar
Security Information and Event Management (SIEM) for proactive threat detection.
Conduct Vulnerability Scans Using OpenVAS and IBM QRadar:
Execute vulnerability scans utilizing OpenVAS and IBM QRadar to proactively identify and address
potential security weaknesses within the network.
Monitor IT Infrastructure Alerts:
Keep a close watch on alerts generated by Paessler PRTG for the IT infrastructure, ensuring the
health and security of the overall system.
Compile Weekly and Monthly Security Reports:
Prepare detailed reports on a weekly and monthly basis, providing a comprehensive overview of the
security landscape. Cover key security events, incidents, observed trends, and assess the
effectiveness of incident response activities.
Escalate Alerts and Incidents to SOC Analyst Level 2:
Actively escalate unresolved alerts, incidents, or situations where standard procedures have failed to
the SOC Analyst Level 2 for further investigation and resolution.
In2IT Technologies
Certainly! Here's an edited version:

Deliver 24/7x365 Monitoring and Support to Clients:


Provide continuous monitoring and support to clients around the clock, ensuring proactive detection
and response to potential issues.
Monitor for Attacks, Intrusions, and Unusual Activity Using AlienVault:
Utilize AlienVault to monitor for attacks, intrusions, and any unusual, unauthorized, or illegal
activities.
Generate Reports:
Produce comprehensive reports based on monitoring activities to provide insights into the security
landscape.
Log Calls Using Cats Service Desk:
Record and manage support calls efficiently using the Cats Service Desk system.
Assist with Cybersecurity Awareness Training:
Contribute to the creation, maintenance, and delivery of cybersecurity awareness training for staff.
Provide Incident Response Support:
Offer support in incident response activities when analysis confirms actionable incidents.
Escalate Vulnerabilities and Threats to Relevant Parties and SOC Manager:
Escalate both open and non-closed vulnerabilities and threats to the relevant parties and the SOC
Manager.
Integrate and Share Information with Analysts and Teams:
Collaborate with other analysts and teams, ensuring seamless integration and sharing of critical
information.
Investigate, Document, and Report on Information Security Issues:
Conduct thorough investigations, document findings, and report on information security issues and
emerging trends.

Ingress Technologies (Pty) Ltd


Certainly! Here's an edited version:

System Problem Identification and Resolution:


Collaborate with employees to identify system problems and provide guidance on effective solutions.
System Infrastructure Maintenance:
Ensure the upkeep of system infrastructure to guarantee optimal performance and reliability.
Printer Support:
Provide support for printers, addressing any issues that may arise.
Software and Hardware Troubleshooting:
Conduct troubleshooting for both software and hardware-related issues.
Network Troubleshooting:
Investigate and resolve network-related problems to maintain seamless connectivity.
Telephonic/Email Support and Ticket Logging:
Offer telephonic and email support, logging tickets and service calls for efficient issue resolution.
IT Asset Management:
Manage IT assets to track and maintain an organized inventory.
User Management on Active Directory and O365:
Create new user accounts and reset passwords for users on Active Directory and O365.
End User Technical Support:
Assist end users with technical support, ensuring smooth and effective resolution of issues.
System Testing:
Conduct thorough testing of systems to validate functionality and identify potential improvements.
Analysis of Call Logs for Trend Identification:
Analyze call logs to identify common trends and underlying problems for proactive issue resolution.
Orientation and Guidance for End Users:
Provide orientation and guidance to end users on how to operate new software and computer
equipment.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy