INFORMATION SECURITY RISK ANALYST
Salary undisclosed
Apply on
Availability Status
This job is expected to be in high demand and may close soon. We’ll remove this job ad once it's closed.
Original
Simplified
Study and identify various threats faced by information and data systems in organizations. Types of threats such as cyber-attacks, hacking, physical loss of equipment or other internal threats that can compromise data security. Measure the potential negative impact that occurs if the threat becomes a reality. Assess the probability that a threat will occur by involving the analysis of factors such as system vulnerability, current level of protection and from previous incident logs. Carry out reliability testing (penetration testing) periodically to identify and evaluate the system's resistance to cyber-attacks. Perform penetration testing to try to penetrate networks, applications, systems in a controlled environment to assess current vulnerabilities and identify necessary remedial measures. Identify areas in the organization's infrastructure and operations that are most vulnerable to information security attacks or incidents. • Technical Vulnerabilities: Weaknesses in software, operating systems or network configurations that can be exploited by attackers. • Physical Vulnerabilities: Physical areas, such as uncontrolled entrances, unmonitored zones or lack of access control to sensitive equipment and information. • Process Vulnerabilities: Weaknesses in the operational processes of management that can provide opportunities for attackers to compromise information security. • Human Vulnerability: Inappropriate human behavior and actions from the aspect of negligence, lack of security awareness or irresponsible internal actions. Investigate information security incidents quickly and effectively when they occur, including clear reporting processes and emergency response procedures. Perform root cause analysis to identify the root cause of the incident and preventive measures that can be taken to prevent the recurrence of similar incidents in the future. Collaborate with relevant parties in the organization to develop risk reduction strategies with the implementation of additional security measures, more effective monitoring and increased security awareness for staff. Ensure the existence of adequate backup and disaster recovery to restore operations in case of attack or significant data loss by encompassing data recovery processes, network and regular training for staff to ensure good preparedness. Measuring and researching the effectiveness of measures that have been carried out by collecting data on information security incidents, evaluating their impact on the implemented strategy and then making adjustments if necessary. Monitor information security issues and evolving cyber-attack trends and engage in the cyber security community to share information about threats and effective defense strategies. Coordinate the implementation of information security measures with relevant cyber security regulations and standards, such as the NIST Cybersecurity Framework, ISO/IEC 27001 and local legal standards related to personal data protection.
Similar Jobs