About The Position

The Information Security Analyst plays a vital role in reactively securing our client networks. The role is perfect for someone who enjoys working in a fast-paced environment, has the ability to multitask and prioritize, and has strong written and verbal communication skills. The right candidate will triage incoming alerts and take the appropriate remediation steps to ensure our clients can remain productive while being secured.

Requirements

  • Organization Skills: Excellent organizational skills to manage multiple tasks and alerts simultaneously
  • Communication: Outstanding communication skills, both verbal and written, with the ability to manage client communications and team interactions proficiently.
  • Team Collaboration: Ability to work collaboratively within a team environment, including cross functional teams.
  • Decision Making: Ability to make informed and timely decisions in high-pressure situations, such as during a security incident.
  • Adaptability: Ability to adapt to new security challenges, technologies, and industry trends.
  • Experience with: Security tools such as EDR, MDR, SIEM
  • Experience with: Windows desktop and server operating systems
  • Experience with: Microsoft 365 and Azure Active Directory.
  • Familiarity with Email threat protection tools and concepts.
  • Reliable personal transportation for use in traveling to clients' offices is essential if ever needed (Although rare)
  • Due to the nature of the work, you may be required to fulfill on-call, incident response duties as part of a night and weekend rotation. Additional work hours may also be required during incident remediation events.
  • This position may require travel to industry events, Network Coverage office locations, and Network Coverage events where locations will vary.

Responsibilities

  • Triage incoming alerts, prioritizing by impact and urgency.
  • Ensure appropriate client facing and internal communications.
  • Follow established guidelines to detect, respond to and limit the effects of an information security event.
  • Escalate the company's response efforts based on the severity of the incident.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service