Equity Bank
Not Specified, Not Specified

Information Security Analyst

OnsitePosted todayWebsiteLinkedIn

Skip the busywork

ApplyBolt rewrites your resume for this exact role and hits submit. You just pick the jobs.

Resume tailored to this roleApplied in secondsTrack every application
Download the app

About this role

%3Cp class=%22MsoNormal%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3E%3Cstrong%3EJob Description – Information Security Analyst%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:150%;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3E%3Cstrong%3EPurpose of the Job%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:150%;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EThe main responsibility for an Information Security Analyst includes monitoring, detecting, analyzing, and responding to cybersecurity incidents using a variety of security tools and processes. They also ensure that all computing assets are compliant with deployed security tools to ensure cyber resilient Infrastructure.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:150%;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3E%3Cstrong%3EKey Responsibilities:%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpFirst%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EMonitor security alerts and events from our SIEM and other security tools.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3Eanalyze suspected intrusions, confirm attacks, and assess impact, escalating serious incidents per the incident response plan.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EPerform initial triage of alerts and escalate when necessary.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EDocument incidents, investigations, and actions taken.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EParticipate in projects and changes related to security monitoring%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EParticipate in implementation of FinSOC, as well as managing and monitoring FinSOC alerts.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EWork closely with IT, security teams, and other departments when issues arise.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EParticipate in the development, customization, and improvement of SOC processes, playbooks, and incident handling procedures.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EStay updated on security threats, trends, and industry best practices.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EConduct regular vulnerability scans%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EReview all computing estates’ compliance status on all cybersecurity tools and follow up remediation actions%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpLast%22 style=%22line-height:150%;mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:150%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EAny other responsibility that may be assigned by the line manager.%3C/span%3E%3C/span%3E%3C/p%3E
%3Cp class=%22MsoNormal%22 style=%22line-height:150%;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3E%3Cstrong%3EQualifications:%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cul style=%22margin-top:0in;%22 type=%22disc%22%3E%3Cli class=%22MsoNormal%22 style=%22line-height:150%;margin-bottom:0in;mso-list:l1 level1 lfo1;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EBachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related field.%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22line-height:150%;margin-bottom:0in;mso-list:l1 level1 lfo1;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EAt least 1 year of experience in a cybersecurity or SOC role.%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22line-height:150%;margin-bottom:0in;mso-list:l1 level1 lfo1;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EFamiliarity with SIEM tools (e.g., Logrythm, Splunk, QRadar, ArcSight, Sentinel).%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22line-height:150%;margin-bottom:0in;mso-list:l1 level1 lfo1;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EKnowledge of networking protocols, operating systems (Windows, Linux), and security technologies (firewalls, IDS/IPS, antivirus).%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22line-height:150%;margin-bottom:0in;mso-list:l1 level1 lfo1;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3ESecurity certifications such as CompTIA Security+, CySA+, CEH, SSCP, or equivalent%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22line-height:150%;margin-bottom:0in;mso-list:l1 level1 lfo1;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EUnderstanding of cybersecurity frameworks (NIST, MITRE ATT%26amp;CK).%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22line-height:150%;margin-bottom:0in;mso-list:l1 level1 lfo1;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EStrong analytical and problem-solving skills.%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22line-height:150%;margin-bottom:0in;mso-list:l1 level1 lfo1;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EAbility to work in a fast-paced environment.%3C/span%3E%3C/span%3E%3C/li%3E%3C/ul%3E%3Cp class=%22MsoNormal%22 style=%22line-height:150%;%22%3E%26nbsp;%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:150%;%22%3E%26nbsp;%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22line-height:150%;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3E%3Cstrong%3EWorking model:%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cul style=%22margin-top:0in;%22 type=%22disc%22%3E%3Cli class=%22MsoNormal%22 style=%22line-height:150%;mso-list:l0 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3E24/7 shift-based operations (may include nights, weekends, holidays).%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22line-height:150%;mso-list:l0 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3EWorking on-site%3C/span%3E%3C/span%3E%3C/li%3E%3C/ul%3E%3Cp class=%22MsoNormal%22 style=%22line-height:150%;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:150%;%22%3E%3Cstrong%3ECore competencies:%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cul style=%22margin-top:0in;%22 type=%22disc%22%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo3;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EAnalytical thinking and problem-solving%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo3;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EStrong attention to detail%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo3;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EAbility to communicate findings clearly both in technical and non-technical terms%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo3;tab-stops:list .5in;%22%3E%3Cspan style=%22font-family:%26quot;Arial Narrow%26quot;,sans-serif;font-size:11.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EKnowledge of relevant standards and regulatory requirements%3C/span%3E%3C/span%3E%3C/li%3E%3C/ul%3E