Posted 23 days ago

Information Security Analyst

Job Summary:

The Informatin Security Analyst will be responsible for ensuring that individuals have the appropriate access to resources, collaborate with

the SOC activities, participate in blue team/red team excercises, participate in the Incident response process, support cybersecurity

assessment in a cloud environment.


Responsibilities:


  • Access Control Management:

Define, manage, and enforce access control policies and procedures across the organization.

Conduct regular reviews of user access levels, permissions, and roles to ensure compliance with policies and regulations.

Handle access provisioning and de-provisioning processes, ensuring timely updates to user access rights based on role changes,

terminations, or other factors.


  • Cybersecurity Threat Monitoring and Response:

Continuously monitor for emerging security threats, vulnerabilities, and attack vectors.

Analyze threat intelligence from internal and external sources to keep the organization ahead of potential attacks.

Perform vulnerability assessments and coordinate with other teams to remediate identified risks.

Support security incident response activities, including containment, eradication, and recovery phases.

Conduct forensic analysis of compromised systems and create detailed reports on findings and recommendations.

Assist in designing and implementing security monitoring, detection, and prevention mechanisms (IDS/IPS, Firewalls, etc.).


  • Collaboration & Communication:

Work closely with other IT and business teams to integrate security best practices into day-to-day operations.

Provide security awareness training and advice to employees to improve their understanding of security policies.

Participate in internal and external audits and assist with remediation of audit findings related to cybersecurity.

Engage in knowledge sharing, mentorship, and training within the team to enhance security expertise across the team.



Experience We’re Looking For:

  • Bachelor’s degree in Computer Science, Information Security, or a related field. Relevant certifications or experience may substitute for
  • formal education.
  • 3-5 years of experience in a related Information Security role (IAM, Ethical Hacker, Monitoring, Blue tam/Red team, Infosec 3rd level
  • support)
  • Experience with cloud security, including AWS, Azure, or Google Cloud.
  • Strong understanding of identity management principles, access control models, and regulatory compliance requirements.
  • High level of precision when monitoring security logs, analyzing threats, and auditing systems.
  • Familiarity with automation and scripting tools (e.g., Python, PowerShell) for incident response or IAM processes.
  • Experience with disaster recovery and business continuity planning.
  • Excellent analytical, problem-solving, and communication skills.
  • Experience with DevSecOps and integrating tools and resources into CI/CD pipelines.
  • Ability to work independently and collaboratively in a fast-paced environment.



  • 1HR Screening
  • 2Interview with the team
  • 3Interview with the leader