GSOC Analyst

Dallas, Texas, United States

Applications have closed

Control Risks

Control Risks is the specialist global risk consultancy that helps organisations succeed in a volatile world. Find out more.

View company page

This position will cover Night Shift (11:00 pm-7:00 am)

Roles and responsibilities

  • Monitoring access control to the Client Headquarters, which include intercom systems, video security systems, and security platforms.
  • Identify geopolitical events impacting Client employees, events, and facilities, and provide intermittent and appropriate notifications to the Global Security Intelligence Team.
  • Continuously utilize open source intelligence techniques (OSINT) to identify security risks which have the potential to affect Client personnel, assets, and reputation.
  • Primary security center for receiving the reporting of incidents involving company personnel/assets, and initiating notification to the appropriate response personnel.
  • Assess security issues or emergency situations suitably; primary liaison between Emergency Medical Services, Fire Department, local Law Enforcement.
  • Works with the GSOC Lead Specialist to identify areas for improvement in internal processes.
  • Interacting routinely with employees, executives and contractors.
  • Providing daily guidance and oversight of the contract security staff onsite.
  • Providing security-related support to internal customers.
  • Monitoring and directing the appropriate response and notification requirements for various security alarm systems.
  • Directing emergency and non-emergency response to site-related situations.
  • Monitoring the operation of all security equipment at the corporate headquarters and remote locations to ensure they are operating properly and to coordinate service when needed.
  • Handling sensitive and confidential information with limited supervision.

Requirements

Candidate qualifications

The successful candidate for the embedded Security Analyst will possess all or most of the following skills and experience:

  • Bachelor’s Degree in Security Management, Political Science, or Business Management
  • 0-1 years’ experience working in a Security Operations Center or Risk Assessment Center.
  • Possesses geopolitical awareness, knowledge of global events, and cultural sensitivity.
  • Technical competence, particularly in video management and alarm monitoring systems.
  • Proficient in Microsoft Office Suite.
  • Previous military or law enforcement experience
  • Experience using open source intelligence techniques (OSINT).
  • Examination and critical thinking skills for recognizing, accumulating, and evaluating data to identify rational and actionable decisions.
  • Ability and willingness to work various shift including weekends and holidays and overtime, when necessary.
  • Ability to maintain strict confidentiality of company related matters.
  • Possess the ability to understand and interpret the security policies, procedures, and guidelines
  • Demonstrate developed interpersonal skills with focus on customer orientation
  • Ability to perform under stressful and/or demanding situations
  • Availability to work nights and weekends

Benefits

  • Control Risks offers a competitively positioned compensation and benefits package that is transparent and summarised in the full job offer.
  • We operate a discretionary bonus scheme that incentivizes, and rewards individuals based on company and individual performance
  • Control Risks supports hybrid working arrangements, wherever possible, that emphasize the value of in-person time together - in the office and with our clients - while continuing to support flexible and remote working.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Monitoring Open Source OSINT Risk assessment

Perks/benefits: Flex hours Salary bonus Team events

Region: North America
Country: United States
Job stats:  86  21  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.