Sign up
Sign up
The Cybersecurity Operations Analyst for Caesars is responsible for implementing the Cybersecurity program and strategy at a tactical and operational level (network, infrastructure, applications, and databases) to ensure that security controls are functioning efficiently and effectively, more specifically in the realm of security logging, monitoring, alert management, incident handling, vulnerability and configuration management. Furthermore, this position also supports the Cybersecurity Team in doing security research and development, product evaluations, consulting, project support, and any other operational tasks needed to support the overall requirements of the program and strategy.
The Cybersecurity Operations Analyst participates in establishing and implementing security related standards, procedures, and guidelines appropriate to securing the existing environment in partnership with various properties and Information Technology. The optimal goals is to design and implement controls and processes, risk mitigation techniques, and standardized information security solutions that will allow a sensible balance between risks and business operations.
Operational Planning & Management
Documentation, Reporting & Analytics
Required Qualifications:
Preferred Qualifications:
NA
The Cybersecurity Operations Analyst for Caesars is responsible for implementing the Cybersecurity program and strategy at a tactical and operational level (network, infrastructure, applications, and databases) to ensure that security controls are functioning efficiently and effectively, more specifically in the realm of security logging, monitoring, alert management, incident handling, vulnerability and configuration management. Furthermore, this position also supports the Cybersecurity Team in doing security research and development, product evaluations, consulting, project support, and any other operational tasks needed to support the overall requirements of the program and strategy.
The Cybersecurity Operations Analyst participates in establishing and implementing security related standards, procedures, and guidelines appropriate to securing the existing environment in partnership with various properties and Information Technology. The optimal goals is to design and implement controls and processes, risk mitigation techniques, and standardized information security solutions that will allow a sensible balance between risks and business operations.