Information Security Analyst

Bengaluru

Applications have closed
About BPM:

BPM is a full-service accounting firm providing comprehensive assurance, tax, and consulting services to clients globally. We are one of the largest California-based accounting firms and have built our success by focusing on our clients and our people. Our client base encompasses a complex array of sophisticated clients that keep our staff intellectually challenged every day.

Our people-centered culture and firm motto “Because People Matter” has allowed us to be consistently recognized as one of the Best Places to Work in the Bay Area. We are dedicated to providing meaningful careers for all of our employees along with fostering an environment that allows an integrated lifestyle. Our flexible culture allows our professionals to live a balanced lifestyle between their work responsibilities and personal commitments.

About the role:

The IT Security Analyst performs two core functions for BPM. The first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation, and resolution of security breaches detected by those systems. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments. The IT Security Analyst is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals.

Responsibilities:

  • Strategy & Planning

  • Participate in the planning and design of enterprise security architecture, under the direction of the IT Security Manager, where appropriate.
  • Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate.
  • Participate in the planning and design of an enterprise business continuity plan and disaster recovery plan, under the direction of the IT Security Manager, where appropriate.

  • Acquisition & Deployment

  • Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.
  • Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
  • Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.

  • Operational Management

  • Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices).
  • Instrumental in SOC Operations where one has to have knowledge on Microsoft Sentinel, Microsoft Defender and vulnerability management.
  • Maintain operational configurations of all in-place security solutions as per the established baselines.
  • Monitor all in-place security solutions for efficient and appropriate operations.
  • Review logs and reports of all in-place devices, whether they be under direct control (i.e.security tools) or not (e.g. workstations, servers, network devices). Interpret the implications ofthat activity and devise plans for appropriate resolution.
  • Participate in investigations into problematic activity for phishing attacks
  • Participate in the design and execution of vulnerability assessments, penetration tests, andsecurity audits.
  • Provide on-call support for end users for all in-place security solutions.

  • Personal Attributes

  • Proven analytical and problem-solving abilities.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Good written, oral, and interpersonal communication skills.
  • Ability to conduct research into IT security issues and products as required.
  • Ability to present ideas in business-friendly and user-friendly language.
  • Highly self-motivated and directed.
  • Keen attention to detail.
  • Team-oriented and skilled in working within a collaborative environment.

Education & Experience:

  • College diploma or university degree in Computer Science and/or two years equivalent work experience.
  • One or more of the following certifications:
  • CompTIA Security+
  • GIAC Information Security Fundamentals
  • Microsoft Certified Systems Administrator: Security
  • Associate of (ISC)2

  • Knowledge & Experience:

  • Extensive experience with firewalls, intrusion detection systems, anti-virus software, data encryption, and other industry-standard techniques and practices.
  • Experience with current systems software, protocols, and standards.
  • Working technical knowledge of network, PC, and platform operating systems
  • Strong understanding of IP, TCP/IP, and other network administration protocols.
  • Strong understanding of applicable practices and laws relating to data privacy and protection.
  • Familiarity with hubs, switches, and routers.
Wondering if you should apply?

BPM is powered by knowledgeable, enthusiastic, and forward-thinking people committed to developing a culture of inclusion. We recognize, develop, and empower talent and encourage diversity of thought. Your point of view, skillset and experience will only make us stronger, so if you're eager to share new ideas and try new things, we want to hear from you.

***************

BPM provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.

For positions based in San Francisco, consideration of qualified candidates with arrest and conviction records will be in a manner consistent with the San Francisco Fair Chance Ordinance.

Please note - this posting is for prospective candidates only. Unsolicited third party resume submissions will be considered property of BPM and will not be acknowledged or returned.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Audits CompTIA Computer Science Encryption Firewalls GIAC Intrusion detection Privacy SOC Strategy TCP/IP Vulnerability management

Perks/benefits: Flex hours

Regions: Asia/Pacific North America
Countries: India United States
Job stats:  13  4  0
Category: Analyst Jobs

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.