{"id":6386,"date":"2023-03-21T15:56:37","date_gmt":"2023-03-21T14:56:37","guid":{"rendered":"http:\/\/labmovie.haui.edu.vn\/?post_type=professional_figures&#038;p=6386"},"modified":"2023-03-21T15:56:37","modified_gmt":"2023-03-21T14:56:37","slug":"security-analyst","status":"publish","type":"professional_figures","link":"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/","title":{"rendered":"Security Analyst"},"content":{"rendered":"<h3>What is a Security Analyst ?<\/h3>\n<p><em>An information security analyst detects, investigates, and prevents attacks. They solve problems with technology such as software and IT equipment. Specifically, he\/she installs firewalls, implement breach detection systems, and work with other professionals to resolve security-related issues. He\/she also conducts security system audits and tests and analyze risks. He\/she reports their findings and make recommendations to company executives.<\/em><\/p>\n<h3><strong>Main activities carried out by Security Analyst ?<br \/>\n<\/strong><\/h3>\n<ul>\n<li>\n<div id=\"tw-target-text-container\" class=\"tw-ta-container F0azHf tw-nfl\" tabindex=\"0\">\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Translation\"><em>Design and propose, implement the security solutions to ensure the information security for IT system.<\/em><\/p>\n<\/div>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Translation\"><em>Develop, review and support implementing the information security policies, standards and procedures.<\/em><\/p>\n<\/li>\n<li>\n<div id=\"tw-target-text-container\" class=\"tw-ta-container F0azHf tw-nfl\" tabindex=\"0\">\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Translation\"><em>Manage and configure the security devices: NGFW, WAF to ensure the security for IT systems and endpoints.<\/em><\/p>\n<\/div>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Translation\"><em>Implement, manage and monitor information security, analyze the security information and event, correlate to detect the threats, intrusion, data leakage, and report to management as well as immediately remediate the security incidents.<\/em><\/p>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Translation\"><em>Regularly conduct the security vulnerability scanning for the applications, servers, and network devices; propose and follow up with the security findings mitigation plan to ensure the vulnerabilities are fixed on time.<\/em><\/p>\n<\/li>\n<\/ul>\n<h3><strong>Essential Hard skills and knowledge<br \/>\n<\/strong><\/h3>\n<ul>\n<li><em>Bachelor degree in IT security, computer science. or other related fields.<\/em><\/li>\n<li><em>Security+ or CEH qualification would be an advantage.<\/em><\/li>\n<li>S<em>trong knowledge of IT Infrastructure components: Firewalls-IPS\/IDS, Network and network protocols, Windows (workstations and servers) OS\/ Linux, and their security configuration.<\/em><\/li>\n<li><em>Strong knowledge of and have designed\/implemented\/operated the security systems: NGFW\/WAF\/Vulnerability Management\/SIEM.<\/em><\/li>\n<li><em>Good at security incident detection, analysis, and response, especially in emergent situation.<\/em><\/li>\n<li><em>Good knowledge of web and mobile applications and web\/mobile application security.<\/em><\/li>\n<li><em>At least 2 years working in IT Security.<\/em><\/li>\n<\/ul>\n<div id=\"tw-target-text-container\" class=\"tw-ta-container F0azHf tw-nfl\" tabindex=\"0\"><\/div>\n<h3>Essential Soft skills<\/h3>\n<ul>\n<li><em>Carefulness<\/em>.<\/li>\n<li><em>Communication.<\/em><\/li>\n<li>Work independently and in a team<\/li>\n<li>Work in a high pressure job<\/li>\n<li><em>High responsibility and enthusiasm, discipline, supportive mindset.<\/em><\/li>\n<li><em>Accept business trips when required.<\/em><\/li>\n<\/ul>\n<h3>Language skills<\/h3>\n<ul>\n<li><em>Good English skill (written and verbal) is highly preferred.<\/em><\/li>\n<\/ul>\n<h4>Professional figure is suitable for Senior.<\/h4>\n","protected":false},"template":"","meta":[],"economic_sectors":[92],"seniority_levels":[106],"academic_qualifications":[91,93,95,96,98],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.7.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Analyst - Lab-Movie<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Analyst - Lab-Movie\" \/>\n<meta property=\"og:description\" content=\"What is a Security Analyst ? An information security analyst detects, investigates, and prevents attacks. They solve problems with technology such as software and IT...\" \/>\n<meta property=\"og:url\" content=\"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/\" \/>\n<meta property=\"og:site_name\" content=\"Lab-Movie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/\",\"url\":\"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/\",\"name\":\"Security Analyst - Lab-Movie\",\"isPartOf\":{\"@id\":\"https:\/\/wordpress.insviluppo.eu\/#website\"},\"datePublished\":\"2023-03-21T14:56:37+00:00\",\"dateModified\":\"2023-03-21T14:56:37+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/labmovie.haui.edu.vn\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Professional figures\",\"item\":\"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Analyst\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wordpress.insviluppo.eu\/#website\",\"url\":\"https:\/\/wordpress.insviluppo.eu\/\",\"name\":\"Lab-Movie\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wordpress.insviluppo.eu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Analyst - Lab-Movie","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Security Analyst - Lab-Movie","og_description":"What is a Security Analyst ? An information security analyst detects, investigates, and prevents attacks. They solve problems with technology such as software and IT...","og_url":"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/","og_site_name":"Lab-Movie","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/","url":"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/","name":"Security Analyst - Lab-Movie","isPartOf":{"@id":"https:\/\/wordpress.insviluppo.eu\/#website"},"datePublished":"2023-03-21T14:56:37+00:00","dateModified":"2023-03-21T14:56:37+00:00","breadcrumb":{"@id":"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/security-analyst\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/labmovie.haui.edu.vn\/en\/"},{"@type":"ListItem","position":2,"name":"Professional figures","item":"http:\/\/labmovie.haui.edu.vn\/en\/professional-figures\/"},{"@type":"ListItem","position":3,"name":"Security Analyst"}]},{"@type":"WebSite","@id":"https:\/\/wordpress.insviluppo.eu\/#website","url":"https:\/\/wordpress.insviluppo.eu\/","name":"Lab-Movie","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wordpress.insviluppo.eu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"http:\/\/labmovie.haui.edu.vn\/en\/wp-json\/wp\/v2\/professional_figures\/6386"}],"collection":[{"href":"http:\/\/labmovie.haui.edu.vn\/en\/wp-json\/wp\/v2\/professional_figures"}],"about":[{"href":"http:\/\/labmovie.haui.edu.vn\/en\/wp-json\/wp\/v2\/types\/professional_figures"}],"wp:attachment":[{"href":"http:\/\/labmovie.haui.edu.vn\/en\/wp-json\/wp\/v2\/media?parent=6386"}],"wp:term":[{"taxonomy":"economic_sectors","embeddable":true,"href":"http:\/\/labmovie.haui.edu.vn\/en\/wp-json\/wp\/v2\/economic_sectors?post=6386"},{"taxonomy":"seniority_levels","embeddable":true,"href":"http:\/\/labmovie.haui.edu.vn\/en\/wp-json\/wp\/v2\/seniority_levels?post=6386"},{"taxonomy":"academic_qualifications","embeddable":true,"href":"http:\/\/labmovie.haui.edu.vn\/en\/wp-json\/wp\/v2\/academic_qualifications?post=6386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}