Security Analyst (Operations)
Role details
Job location
Tech stack
Job description
As a security analyst you will be responsible for analyzing, maintaining and implementing the Cyber Security requirements of Taylor Wimpey. This specific role will have a focus on ensuring that TW implement and maintain good and recommended security practices on all our live services, with a special focus on Microsoft services. You will be responsible for both monitoring and reporting upon the threat status of Taylor Wimpey. You will be working within a cyber security team and may be expected to undertake a wide variety of functions to help deliver a secure environment. You will be expected to digest, summarise and provide recommendations based upon a range of security information from a range of third parties. Primary Responsibilities
- Review and ensure the Taylor Wimpey security standards and best security practices are being utilised across all existing infrastructure and application services
- Self-sufficient in developing skills and knowledge in understanding how to protect against new security TTPs as identified
- Review and analyse data provided from Microsoft Defender and Sentinel system
- Review, test and raise changes to meet Microsoft recommended security enhancements, and track their delivery
- Monitor and track new advice on the security services and products in use within the Taylor Wimpey estate
- Raise and ensure implementation of new security practices, or security improvements, in existing infrastructure services, and systems, primarily Microsoft
- Reviewing and managing the current best security practices for a variety of systems, including:
-
Microsoft O/S
-
SQL database
-
M365 o O365 o Power BI o Dynamics o Power Apps
-
Azure Cloud environment
-
Active Directory
-
Third party SaaS providers
-
Application vendors
-
Network Security
-
Identity management and control
-
A wide range of onsite systems and applications
- Ensuring best security practices are reviewed as soon as released and recommendations provided to TW where appropriate
- Ability to pragmatically recommend and prioritise required implementation effort based upon Taylor Wimpey risk appetite
- Ensure TW maintain currency with security best practice and configuration recommendations for a variety of systems
- Provide recommendations on improvements to security environments, including detailed configuration setups
- Develop and manage a roadmap of work to ensure new advice and risks are managed within the current infrastructure
- Preferred, not essential, skills to program using Power Bi and Power apps (using a range of inputs and logs) to ensure system security information is analysed effectively and appropriate messages are identified to assist Taylor Wimpey management to make effective risk and resource decisions.
- Engage with (external and internal) support teams to ensure remediation plans are created for any identified risks (or risks are accepted)
- Ensuring security architectures implemented fully by existing systems, and deliver all the security requirements defined within the Taylor Wimpey ISMS and best practices
- Identify and develop appropriate means of investigation to ensure risks are identified
- Researching and evaluating new security products and solutions, and recommending them to improve the organization's security posture
- Participating in incident response and recovery activities, such as investigating breaches, containing attacks, restoring systems, etc
- Generating reports and dashboards to communicate the status and performance of security environment to stakeholders
- Articulate and raise risks where required
- Collaborate with support Service Providers, IT and business stakeholders
- Analyze general industry standards to ensure compliance within TW appropriate to the risk appetite of TW, these include:
- NCSC
- CISA recommendations
- ISF SOGP changes
- CE + demands
- ISO 27001
- NIST
Requirements
Do you have experience in SQL?, * Previous operational cyber security industry experience - 3 years minimum.
- Demonstrable experience of working in a cybersecurity operations role
- Self motivated and able to work autonomously
- Knowledge of Cyber Security Risk Management
- Power BI Skills
- Power Apps Skills
- Formal Security qualifications an advantage - ie CISM or equivalent
- Microsoft security configuration experience and expertise
- Security administration on critical systems, such as Microsoft
- Ability to work with various levels of management and SMEs
- Proven track record in undertaking security operations within complex organisational environments
- Proficiency in security assessment tools and methodologies
- Ability to assess complex security issues, developing metrics and providing effective solutions
- Understanding of key business and IT trends which may influence future strategies