IT SECURITY ANALYST SKILLS, EXPERIENCES, AND JOB REQUIREMENTS
Published: Nov 06, 2025 - The Information Technology (IT) Security Analyst demonstrates strong knowledge of security concepts, tools, and frameworks within Microsoft Windows and network environments. This role requires managing and analyzing security alerts, developing detections, and implementing mitigation strategies using technologies such as firewalls, IDS/IPS, and EDR solutions. The analyst also emphasizes effective communication, organizational skills, and the ability to automate security tasks through scripting languages like Python or PowerShell.
Essential Hard and Soft Skills for an IT Security Analyst Resume
- Firewall Management
- Vulnerability Management
- Incident Response
- Risk Assessment
- Network Security
- Policy Development
- Security Auditing
- Log Analysis
- Cloud Security
- Data Protection
- Team Collaboration
- Security Training
- Process Improvement
- Cross-Team Communication
- Technical Support
- Client Liaison
- Security Consulting
- Project Management
- Team Participation
- Incident Prevention

Summary of IT Security Analyst Knowledge and Qualifications on Resume
1. BA in Cybersecurity Management with 7 years of Experience
- Strong foundation in information technology and information security principles
- Strong knowledge of current security threats, techniques, and landscape, as well as a dedicated and self-driven desire to research the current information security landscape
- Experience in threat modeling to identify risks posed by new technologies or implementations
- Familiarity with forensic tools used as part of security event investigations
- Possession of or ability to obtain professional certifications in information security or risk management, such as a CISSP, CEH, CISM or CRISC
- Basic knowledge of security and control frameworks, such as NIST CSF, ISO27001/2, COBIT, ITIL, and CIS
- Interpersonal and collaborative skills and the ability to communicate security and risk-related concepts to technical and nontechnical audiences
- Innovative, creative, curious and passionate about security and information technology
- High degree of initiative, dependability and ability to work with little supervision
- Proficiency in Office 365 tools and collaboration technologies
- Ability to formulate a clear and actionable plan and execute against it
2. BS in Information Technology with 4 years of Experience
- Experience with Infrastructure / System Engineering background
- Experience with on-premise Kubernetes and container security management
- Detailed understanding of securing the end-to-end image/container lifecycle from image build to production deployment
- Experience in DevSecOps principles and tools for container security management and at a detailed level on Namespace, Container and Pods
- Experience with computer network penetration testing and techniques
- Understanding of traffic flow and how access lists can be achieved in zero-trust networks
- Understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
- Ability to identify and mitigate network vulnerabilities and explain how to avoid them
- Understanding of patch management with the ability to deploy patches on time while understanding business impact
3. BS in Computer Science with 9 years of Experience
- Must have SOC/NOC experience
- Excellent verbal, written and interpersonal communication skills as well as attention to detail
- Knowledge of Internet threat landscape and attacker motivations (phishing, malware, APT, DoS, etc.)
- Previous experience in an information systems or network administration role
- Previous experience of at least one scripting language (e.g, Python, Groovy, Perl, Ruby, Shell scripting, etc.)
- Knowledge and experience working with various information security frameworks (ISO/IEC 27001, NIST 800-53, COBIT, etc) and regulatory frameworks (SOX, PCI-DSS 3.2, HIPAA, GDPR, etc.)
- Working knowledge of information security control technologies including access control, cryptography, vulnerability management, SIEM/log management, ID/IPS, and penetration testing
- Working knowledge of information technologies including Linux, Windows, VMWare, MySQL, MSSQL, Oracle, etc.
- Working knowledge of network protocols, DNS, and networking devices - routers, VPNs, proxies, firewalls
- Demonstrate ability to engage and collaborate with employees, presenting a friendly, approachable demeanor to leverage security to help others succeed
- Proficient in English, verbal and written
- Must have certification in one or more of the following: CISSP, CCSP, CISA, CISM, CRISC, CCNA
- Familiarity with GIAC GCFE, GCFA, GCIH
4. BS in Computer Engineering with 6 years of Experience
- Hands-on experience using vulnerability management tools such as Tenable, Nessus, Rapid7, Aqua
- Experience with DAST/SCA products such as Fortify and Blackduck
- Solid understanding of vulnerability management within enterprise environments including on-premises, private and public cloud such as AWS, Google Cloud or similar
- Experience in Linux and Windows server knowledge for validation of vulnerabilities, troubleshooting scanning issues, agent installs and performance monitoring
- Experience with network mapping tools such as Algosec, Skybox, and Tufin
- Excellent problem-solving, critical thinking, and communication skills
- Experience in data analytical tools such as Splunk, PowerBI, API Integration and MySQL
- Knowledge of network and security technologies
- Strong knowledge of Unix systems
- Experience with an overall security mindset
- Prior knowledge of the authorization and access tool called BoKS
- Deep Unix administrator experience
- Knowledge of networking and firewall complexities
5. BS in Network Engineering with 5 years of Experience
- Strong technical IT and IT-security knowledge with a focus on system/product development
- In-depth knowledge about cybersecurity frameworks such as ISO27001 and NIST
- Experience from working with IT security for government authorities or in a global company
- Experience from working with incident handling and/or incident investigations
- Written and verbal communication skills
- Understanding of business needs versus security requirements
- Able to be a team player, always looking for the best solutions
- Strong collaborative skills to be able to define stakeholder needs on IT, to enable significant and positive effects on user workflow
- Maintain knowledge of new and emerging security threats, security frameworks, and regulations
- Experience from working in an international environment
6. BA in Digital Forensics with 7 years of Experience
- Experience in Cybersecurity
- Working with Windows and Linux operating systems
- Experience with vulnerability management and performing vulnerability and penetration testing and remediation
- Strong understanding of PCI compliance and previous experience ensuring compliance is maintained
- Experience with other compliance, like CCPA or SOX
- Experience with Microsoft security suite of products (Defender for Endpoint, Defender for Office, Cloud App Security, Azure AD)
- Experience with application or database management
- Experience implementing or supporting security frameworks such as NIST, CIS and Zero Trust
- Experience with DevSecOps
- Must have one or more security certificates (Security+, CISSP, CISA)
- Ability to prioritize multiple tasks and organize work to meet deadlines and multiple requests
- Ability to adapt quickly to change and handle ambiguity
- Ability to communicate effectively with individuals with differing knowledge levels and technical abilities
7. BS in Telecommunications with 6 years of Experience
- Strong knowledge of common vulnerabilities and exploitation techniques
- Understanding of basic network, platform, and authentication technologies such as LDAP and TCP/IP
- Proficiency with at least one scripting language (e.g., Perl, Python, PowerShell)
- Ability to weigh business needs against security concerns and articulate issues to management
- Experience with vulnerability assessment and policy compliance tools
- Experience with network, operating system, and application security tools sets
- Able to work with a changing schedule that includes standard or non-standard business hours of work
- Solid understanding and technical expertise in security architecture
- Demonstrated ability with tracking APT groups and other high-grade threats
- Demonstrated ability in system, network, and/or application security
- Ability building automated tools in C, C++, Java, Python, Perl, PowerShell, or Ruby
- Demonstrated ability with SQL or other query languages
8. BS in Applied Computer Science with 8 years of Experience
- Experience in network or systems administration
- Solid technical knowledge with current versions of Windows, Windows Server, OSX, SQL Server, MySQL, Linux
- Strong working knowledge of IT industry security best practices
- Experience adhering to HIPAA/HiTech, FERPA, and 21CFR Part 11 guidelines
- Experience with IBM QRadar, Tenable Nessus
- Experience securing enterprise directories including NetIQ eDirectory and Microsoft Active Directory
- Familiarity with FortiNet, Extreme Networks, Aruba Networks, and NetApp
- Familiarity with ZenWorks Endpoint and Patch Management
- Advanced knowledge and proficiency in using personal computer equipment and related software
- Knowledge and proficiency in grammar and spelling skills
- Ability to quickly learn software packages
- Ability to effectively communicate with others verbally and in writing
- Ability to meet assigned deadlines
- Ability to interpret, comprehend, and transmit complicated and detailed instructions accurately
- Demonstrate the ability to recognize priorities in the organization of workflow
- Able to perform duties independently, with a minimal need for direct supervision
9. BA in Management Information Systems with 10 years of Experience
- Experience with IT Security Technical Control Software solutions
- Previous Security monitoring and reporting experience
- Experience with Anti-Virus / Anti-Malware engineering support, including installation and support of the backend product as well as local endpoint agent support
- Experience of supporting the Atlassian product stack (e.g, Jira/Confluence/BitBucket) in particularly Jira processes, workflows, automation, and creation of custom projects
- Experience with reporting and analysis tools
- Knowledge of server technologies
- Knowledge of end-user technologies
- Previous experience with scripting languages such as Python or Regex, etc
- Operating Systems experience including Windows and Linux
- Solid technical background in IT and associated technologies
- Demonstrable knowledge of installation, configuration and ongoing support of IT Networking hardware such as routers, switches, firewalls (other cyber-related devices)
- Analytical background with the ability to analyse and interpret large and complex data sets and articulate observations, conclusions and recommendations
- Background of prior experience of working in an information and/or cybersecurity environment (Government or commercial sector) environments
- Experience and knowledge of SIEM Toolsets / Protective Monitoring such as Splunk, Arcsight
- Experience with ITIL Processes
- Technical background with experience in an IT or IT Security operations or equivalent role
- Experience with Anti-Virus, Anti-Malware and or OS Hardening
10. BS in Electrical Engineering with 6 years of Experience
- Experience with analyzing network and endpoint traffic
- Exposure to network devices, Microsoft Windows systems, UNIX systems, and other security assessment tools (NMAP, Nessus, Metasploit, Netcat, etc.)
- Experience in threat intelligence report analysis
- Experience with log management and security information management tools
- Experience with SIEM, SOAR, UBA, anti-malware, spam, phishing and TIP tools
- Knowledge of log formats from various log sources
- Knowledge of data protection regulation key principles
- English language at B2 level or above
- Experience with Splunk Enterprise Security solution
- Basic programming skills such as Python, C/C++/Perl and other scripting languages
- Understanding of contemporary and legacy security technologies (e.g., IDS, Firewalls, IAM, SIEM)
11. BS in Cyber Operations with 7 years of Experience
- Experience working with Parcel management systems (Universe)
- Direct experience with anti-virus software, endpoint detection response (EDR), firewalls and content filtering
- Good level of understanding of the approach threat actors take to attacking a network, phishing, port scanning, web application attacks, DDoS, and lateral movement
- Knowledge in Windows, Mac OS, Linux and Google operating systems including how to investigate them for signs of compromise (IOC’s)
- Foundational level of scripting knowledge
- Basic understanding of Cloud architecture and how an attacker can utilize these platforms
- Ability to demonstrate the right approach to investigating alerts and/or indicators and document findings in a manner that both peer and executive-level colleagues can understand
- Comfortable using SIEM and logging tools (e.g., Graylog, Grafana, Elastic) to build monitoring dashboards which will help with the identification of future or existing threats
- Demonstrate a strong understanding of Cisco’s EDR and complementary security solutions (Secure Endpoint Suite and Umbrella)
- Appreciation of the wider roles of interconnecting Cyber Security teams and collaboration with each of those (i.e., Forensics / Threat Intelligence / Penetration Testing / Vulnerability Management / "Purple Teaming", etc)
- Demonstrate the core values of DPD - Passion, Respect, Honesty, Flexibility, Hard work and Accountability
12. BA in Homeland Security with 8 years of Experience
- Experience using internal and external datasets to analyze and identify trends, anomalies, and activities indicative of advanced threats
- Computer security fundamentals experience
- Must have computer security certifications (e.g., SANS) or organization-specific training relevant to computer security
- Experience with security tools such as intrusion detection, log analysis and network scanning
- Experience with insider threat investigations
- Knowledge of web, security, and networking protocols
- Experience collaborating with diverse internal and external partner teams throughout an investigation or issue
- IT experience combined with a Financial background (Funds / Investment services)
- Experience managing 3rd party software providers
- Knowledge of Security fundamentals including access control, cryptography, vulnerability management, secure configurations, secret management, logging and alerting, and system and network Security
- Understanding of Secure Software Development Life Cycle (SSDLC) practices
- Understanding of infrastructure and platform technologies (Windows, Linux, virtualisation, public cloud, firewalls, etc.) and related secure design patterns
- Solid understanding of relevant cross-border regulations and guidelines (CBI, CSSF, EBA)
13. BS in Computer Science with 3 years of Experience
- Strong technical background in Information Security with a desire to understand diverse platforms and complex IT solutions spanning various operating systems, cloud infrastructure, and networks
- Must have Security+ Certification or similar
- Basic knowledge of cloud computing (Azure, Google, AWS)
- Knowledge of Windows operating systems, Linux, Mac, and mobile platforms
- Ability to communicate and work effectively with the security team, IT Department managers, and other stakeholders in the company
- Must have strong documentation skills
- Experience with Graylog and Grafana
- Ability to remain detail-oriented in a fast-paced, ever-changing environment
14. BS in Information Technology with 7 years of Experience
- Experience as a technical consultant delivering cybersecurity solutions
- Experience with information security and assessment frameworks, including ISO 27001/2, COBIT, or NIST
- Knowledge of cyber threats and SOC tools, threat intelligence, threat hunting, security content, Alert Management, Incident Response, Vulnerability Management, Red Team, and SOC metrics
- Ability to drive the identification and implementation of security solutions
- Ability to analyze and solve complex challenges and work with client deliverables and requirements
- Ability to learn new IT expertise and concepts quickly
- Ability to collaborate with others
- Experience with Cybersecurity consulting, leading security project delivery teams in private sector organizations
- Experience with security operations-focused roles as an incident handler, vulnerability analyst, red teamer, pentester, threat intelligence analyst, threat hunter, or SOC lead
- Experience with Microsoft Excel, Visio, and PowerPoint
- Knowledge of risk management disciplines
- Knowledge of IT infrastructure and networking (TCP/IP) concepts
- Knowledge of Cybersecurity concepts
- Ability to contribute to a positive team attitude
15. BS in Computer Engineering with 6 years of Experience
- Working experience in Security Operations and Analysis, IT Risk Management, Cyber Risk Management or Threat Intelligence experience
- Must have advanced knowledge of GLBA, NIST 800-53, ISO 27005, or FFIEC Cybersecurity Framework
- Must have CISSP, CISM, CRISC, or CISA certifications
- Experience working with IT GRC platforms such as RSA Archer, ServiceNow, and MetricStream
- Experience in the Banking industry
- Basic knowledge of the security confidentiality, integrity, and availability (CIA) Triad
- Basic knowledge of security information and events management (SIEM) solutions
- Ability to work with a broad range of security tools and new technologies
- Ability to handle confidential sensitive information with integrity
- Excellent oral and written communication skills, including presentation skills
- PC literate, including Microsoft Office products
- Analytical and interpretive skills
- Must have excellent interpersonal skills
- Ability to work in a team environment
- Ability to meet or exceed Performance Competencies
16. BS in Software Engineering with 4 years of Experience
- Experience with Information Technology or Information Security
- Experience with NIST best practices and CIS benchmarks
- Understanding of meeting security controls such as ISO27001, Aramco CCC, and ACSC Essential Eight Maturity Model
- Hands-on experience in delivering large-scale solutions with a demonstrated focus on security
- Substantial experience with vulnerability management and scanning platforms
- Proven analytical and troubleshooting skills
- Exceptional attention to detail, a natural collaborator with internal departments and external third-party vendors
- Ability to prioritize workload and manage expectations under pressure
- Excellent written, oral and presentation communication skills
- Ability to work in a fast-paced, customer-centric environment and deliver immediate value
17. BS in Information Assurance with 5 years of Experience
- Experience directly administering a suite of Palo Alto firewalls in an enterprise healthcare environment
- Experience integrating complex projects into existing architecture
- Experience administering Juniper and Cisco firewall technologies
- Strong analytical ability that is rooted in a solid understanding of TCP/IP networking and network protocols
- Deep knowledge of how the Palo Alto firewall processes data
- Knowledge and facility integrating with Palo Alto Cortex for firewall log collection and SIEM alert generation
- Experience with the integration of the Aruba ClearPass NAC solution with Palo Alto firewalls
- Knowledge and experience with firewall secondary support and monitoring systems
- Experience interfacing with Aruba, Arista and Cisco network technologies
- Strong oral, written and presentation skills and a commitment to customer service excellence
- Demonstrated multi-vendor management skills
18. BS in Cloud Computing with 7 years of Experience
- Experience as a Security Analyst or similar role within a large organisation
- Experience with internal auditing for ISO 27001 compliance
- Working knowledge of common vulnerability assessment tools and techniques used for evaluating operating systems, networking devices, databases and web applications
- Good understanding of networking technologies, principles and concepts
- Good understanding of various technologies and operating systems and hardening configurations, i.e., Windows Server, Linux, Solaris, etc.
- Good knowledge of security best practices, security solutions, and methodologies for conducting security assessments
- Good knowledge of cyber security threats and techniques used by adversaries to compromise systems, both technical and non-technical techniques
- Must have CompTIA Cybersecurity Analyst+ (CySA+) or equivalent professional certification
- Must have EC-Council Certified Security Analyst (ECSA) or equivalent professional certification
- Must have GIAC Certified Incident Handler (GCIH) or equivalent professional certification
- Experience with Dell SecureWorks and Qualys
- Experience Securing Oracle Databases
- Experienced in working in and securing cloud environments (AWS)
- Knowledge of UK financial sector regulation and/or bank and building society IT operations
19. BA in Information Security and Risk Management with 8 years of Experience
- Experience with Cyber Security-related technologies and large enterprise implementations
- Practical knowledge of Information Security Management Systems and compliance standards as ISO 27000, SOX and PCI
- Understanding of key security services, such as Internet Content Filtering, Remote Access, Firewalls, IDS/IPS, Virus Protection, AAA (including 2Factor), Digital Certificates and PKI
- Understanding of Public Cloud services
- Must possess strong and demonstrated organizational, communication, and negotiation skills
- Must be able to lead multi-disciplined project teams through the project lifecycle (planning-development-implementation-closeout)
- Demonstrated knowledge in project packages, detailed project plans, project risk identification and mitigating strategies
- Must be able to demonstrate field presence during the planning and installation phases of the project
- Must have experience with multi-national corporations
- Must be able to travel internationally periodically
- Must understand the concepts of Authentication, Authorization and Accounting
- Technical knowledge of Microsoft Windows environments (Windows 7-10.x, Server Platform), MacOS
- Understanding of Risk and the need for risk-based reviews and controls
- Understanding TCP/IP and basic network technologies, advanced knowledge
20. BS in Applied Computer Science with 4 years of Experience
- Working experience in supporting a corporate IT infrastructure in the role of Systems andor Network Administrator
- Experience with Windows Server Administration (patch management, updates)
- Strong knowledge and understanding of Microsoft Active Directory Group Policies
- Ability to diagnose and correct issues with the IT infrastructure
- Ability to effectively handle multiple project assignments concurrently
- Ability to work independently with little direction as well as part of a team
- Familiarity with CCNA, MCSA, Network+ or Security+
- Knowledge of Cisco Agari Identity Services Engine, Email Security Appliance, Unified Communications, Call Manager, VOIP Voice Gateways, SIP Trunking, Unity Call Center
- Understanding of DHCP and DNS
21. BS in Electrical Engineering with 6 years of Experience
- Passion for building security systems that solve business problems and reduce risks
- Experience working with IT security tools
- Experience in implementing/ managing DLP
- Experience in managing endpoint protection tools such as Symantec, Sophos, etc., and other security tools
- Excellent written and verbal communication skills
- Possess good organizational and time management skills
- Strong business organization and process knowledge
- Fundamental understanding of IT Infrastructure and computing systems architecture
- General knowledge of databases, operating systems, applications, and networks
- Must have strong analytical skills
- Strong problem-solving skills
- Ability to prioritize and manage multiple time-sensitive responsibilities
- Ability to work in a team environment
22. BA in Management Information Systems with 5 years of Experience
- Basic knowledge of IT concepts and/or skills
- Knowledge of networking, PC operating systems, antivirus/malware protection, and productivity and collaboration tools
- Great problem-solving skills
- Ability to work in ambiguous situations
- Basic knowledge of Microsoft Outlook, Excel, and PowerPoint
- Demonstrated leadership ability through previous experiences or extracurricular activities
- Ability to successfully manage multiple assignments and has great attention to detail
- Effective verbal and written communication skills
- Ability to work successfully in a team environment, as well as independently
- Excellent productivity and time management skills, and must be a self-starter
23. BS in Cyber Operations with 4 years of Experience
- Working experience in information security
- Experience with the translation of penetration testing and security assessments
- Understanding of firewalls, network switches, proxies, SIEM, antivirus, and IDPS concepts
- Good verbal and written communication skills
- Able to work with very little supervision in a fast-paced environment
- Familiarity with Computer Hardware, Windows 10 OS, and other software support
- Extensive knowledge of Azure AD and broader Azure applications
- Working knowledge of Microsoft security tools including Defender, Endpoint Security, and Multi-Factor Authentication
- Detailed understanding of PowerShell scripting, Power Platform applications (Power Apps, Power Automate), MS Intune, SCCM
24. BS in Computer Engineering with 6 years of Experience
- Experience working in a Cloud Engineer role
- Deep understanding of public cloud technologies (Azure, AWS) including cloud networking and security principles, IaaS resources, automation, and monitoring tools strategies
- Practical knowledge of Infrastructure as a Code using Terraform and knowledge of Azure ARM templates
- Deep understanding of Microsoft Azure cloud platform implementation
- Experience on various tools like Centrify, Terraform, Palo Alto Fw (specifically in Azure)
- Expertise in developing and designing highly available and secure infrastructure in the cloud
- Knowledge of Scripting language
- Experience with secure cloud benchmarks and cloud security best practices
- Well-experienced in managing cloud posture and compliance (ideally using Checkpoint CloudGuard(Dome9)) /Sysdig for container security
- Understanding of Azure AD concepts
25. BS in Computer Science with 3 years of Experience
- Experience in a basic IT security/networking environment
- Fluent in French and English
- Good knowledge of Information Security topics
- General knowledge of external cyber threats like phishing, malware and virus attacks
- Understanding of operational risk assessment
- High level of attention to detail and ability to retrieve and work with information from different tools and applications
- Fast and independent learner, able to work both with and without fixed procedures
- Able to be autonomous and show curiosity (know how to get out of the procedure)
- Communication skills to liaise with various stakeholders and share knowledge within the team
- Adaptability skills to deal with different situations (different topics, different stakeholders, different IT applications)
- Team spirit and confidentiality skills
26. BS in Network Engineering with 5 years of Experience
- Experience and familiarity with the following: O365, Email, MFA, SSO, AD, and AAD administration, endpoint security, system hardening
- Detailed understanding of Windows, Linux, Mac operating systems and servers
- Understanding of general information security principles such as RBAC, least privilege, lateral movement, IOCs, UEBA, vulnerabilities, etc.
- Strong ability to clearly communicate complicated concepts over the phone, in person, and in writing
- Must learn quickly and adapt to a changing environment and be eager to accept new responsibilities
- Experience working with MS Windows environments including Active Directory and Windows Desktop
- Experience with common enterprise security controls
- Awareness of common open source security tools and information sources
- Experience with a programming or scripting language such as Python or PowerShell
27. BA in Information Systems with 7 years of Experience
- Progressive experience working in Information Technology
- Direct experience in systems security administration, systems audit, or security compliance
- Advanced knowledge and understanding of security configurations and monitoring for Microsoft Active Directory Domain Services, Windows and Linux OS, AWS/Azure cloud, logging and monitoring, user access, perimeter protection principles, network communication protocols, etc.
- Must understand information security concepts, protocols, industry best practices and strategies
- Knowledge of industry regulatory requirements and experience working with internal and external security audit staff as well as remediation practices
- High degree of initiative and commitment to ongoing and continuous security improvements, a professional demeanor and collaborative spirit to execute projects and complete tasks proficiently
- Effective communication and meticulous documentation skills
- Strong ability to develop and present comprehensive security reports to different audiences
- Familiarity and knowledge of core security frameworks such as HIPAA, NIST, HITRUST, ISO 27000 Series, etc.
- Healthcare environment experience and IT security certifications
- Skillful in the delivery of superior customer service
- General understanding of Cerner and Financial Systems and their integration
- Ability to transport and move PCs, printers, and related hardware weighing up to 30 pounds
28. BS in Computer Engineering with 6 years of Experience
- Experience in Corporate IT Security administration or a Security Analyst position
- Prior experience patching security vulnerabilities on Servers, endpoints, or applications both on-site or SaaS applications
- Knowledge of Information Security principles and practices, understanding of security protocols, principles, standards and defense in depth
- Experience in analyzing, troubleshooting, and investigating information security incidents from a variety of reporting platforms such as IPS/IDS, DLP, SIEM, and vulnerability monitoring systems
- Knowledge of PKI, VPNs, Firewalls, IDS, TLS, and Incident Handling
- Strong grasp of TCP/IP fundamentals and various operating systems
- Knowledge of VMware and other virtualization products
- Must have exceptional verbal and written communication skills
- Must be able to fulfill periodic on-call responsibilities
- Must be able to work constructively in a team environment
- Working experience in a SaaS company
- Must have CISSP/CEH/SANS Courses or any IT Certifications
29. BS in Software Engineering with 4 years of Experience
- Experience in IT Software
- Possess extensive experience developing and securing applications and web services, or web APIs (Application Programming Interfaces)
- Experience with Information Security Policy, its interpretation, reference, and usage when delivering opinions, recommendations, and guidance
- Experience in implementing API Security and Access Control (OAuth/SAML, Web SSO, SSL, etc.)
- Knowledge of API best practices and performance tuning
- Good experience in supporting the APIs environments (gateway, cloud, microservices, etc.)
- Strong understanding of API creation, management, hardening, and defense
- Experience working in Agile methodologies such as Scrum, Kanban, Lean User Experience (UX), XP
- Ability to communicate with impact, ensuring complex information is articulated in a meaningful way to wide and varied audiences
30. BA in Data Analytics with 3 years of Experience
- Certificate in security (e.g., CISSP, CEH, etc.)
- Knowledge of PCI DSS security frameworks
- Excellent communication and presentation skills in English both verbal and written, German skills are welcome
- Experience in a role supporting the security posture of enterprise software and hardware platforms
- Knowledge of common hardware, software, network and cloud architectures
- Ability to work in a team, service orientation, creativity and enthusiasm for new things
- Experience in having acquired a working knowledge of phishing emails to analyze and categorize them
- Able to assess the operation and function of applicable management systems, networks and applications, internal and external contacts and resources, including procedures, standards and policies, and changes in technology to facilitate the work function
31. BS in Cloud Computing with 8 years of Experience
- Knowledge of IT security concepts and technologies
- Must have IT Security-related certifications, such as Security+
- Understanding of security concepts in a Microsoft Windows environment
- Ability to effectively exchange ideas and information and effectively relate to others to accomplish work responsibilities
- Organizational skills with the ability to prioritize multiple projects
- Experience with some or all of the following technologies: Firewalls, such as Palo Alto, Checkpoint or Cisco
- Experience with common endpoint and network security (intrusion detection, firewall, IPS\IDS, EDR and anti-virus, etc)
- Demonstrated ability to write and test detections using EDR
- Experience in a security operations environment and ability to evaluate security alerts to determine appropriate incident response actions
- Familiarity with common network, system and web application attack vectors and related mitigation strategies
- Ability to communicate effectively and independently manage small projects
- Ability to script or automate in Python, PowerShell or other security-facing languages