You are on page 1of 1

MSS Security Academy Tracks

Learn More

Identity Access Management Firewall Analyst


Threat Monitoring
(IAM) (Network Protection)
The Threat Monitoring Analyst oversees The Identity Access Management Agent The Firewall Analyst oversees analyze
and analyzes events, flows, trends and (IAM) is responsible for user lifecycle events and logs from multiple vendor’s
alerts, and advises the customer of management for in-scope systems using firewall devices, must detect and report
potential security incidents. multi-tier request processing and fulfill- any suspicious activity going through the
ment model. Firewall, review the ACLs and the cus-
Using tools as QRadar or Splunk the ana- tomer’s network in a basic level.
lyst must correlate and filter the informa- In addition, the agent manages of
tion received from multiple sensors and in-scope RACF profiles and policies, As part of the Firewall Analyst role is the
event processors, finding threats and administration and ongoing enhance- configuration and administration of
tuning opportunities to have a healthy ment of in-scope authentication ser- firewall and Unified Threat Management
environment on customer’s consoles. vices, including Active Directory, Centri- (UTM) systems, providing IBM clients
fy, CyberArk and Radiant Logic VDS. with security recommendations and
Should be able to make recommenda- assisting with planning and implementa-
tions to the customers looking for Agents are also responsible for adminis- tion of long-term projects.
decrease the security surface and enforce tration of access roles and policies,
the client’s security posture. execution of re-certification campaigns,
and management of Privileged Access
Management accounts.

You might also like