Negotiable
Undetermined
Remote
Remote
Summary: The DLP Analyst is responsible for designing and configuring detection policies within DLP platforms to monitor data across various states, including in motion, at rest, and in use. This role involves establishing alerts for policy violations and fine-tuning thresholds to minimize false positives while collaborating with business units to adapt monitoring strategies to evolving threats. The analyst plays a crucial role in ensuring operational efficiency and user productivity.
Key Responsibilities:
- Design and configure detection policies and rules within DLP platforms.
- Establish alerts for policy violations such as unauthorized file transfers and sensitive data exposure.
- Fine-tune alert thresholds to reduce false positives and investigate triggered incidents.
- Collaborate with business units to understand legitimate data handling needs.
- Continuously refine monitoring strategies to adapt to evolving threats and organizational requirements.
Key Skills:
- Experience with DLP platforms and data monitoring.
- Knowledge of data protection regulations and compliance.
- Analytical skills for investigating incidents and fine-tuning alerts.
- Ability to collaborate with various business units.
- Strong understanding of data handling practices and security threats.
Salary (Rate): undetermined
City: undetermined
Country: undetermined
Working Arrangements: remote
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
- The DLP Analyst would help design and configure detection policies and rules within DLP platforms that monitor data in motion (network traffic), data at / (stored files and databases), and data in use (endpoint activity).
- They would establish alerts for policy violations such as unauthorized file transfers, sensitive data being emailed externally, improper use of removable media, or cloud uploads containing regulated information like personally identifiable information (PIl) or protected health information (PHI).
- The analyst would fine-tunes alert thresholds to reduce false positives, investigates triggered incidents, collaborates with business units to understand legitimate data handling need and continuously refines monitoring strategies to adapt to evolving threats and organizational requirements while maintaining operational efficiency and user productivity.