-Client is seeking a Security Analyst III.
-Works with business units and other risk functions to identify security requirements, using methods that may include risk and business impact assessments.
Components of this activity include but are not limited to:
-Business system analysis
-Communication, facilitation and consensus building.
-Assists in the coordination and completion of information security operations documentation
-Works with information security leadership to develop strategies and plans to enforce security requirements and address identified risks
-Reports to management concerning residual risk, vulnerabilities and other security exposures, including misuse of information assets and noncompliance.
-Plays an advisory role in application development or acquisition projects to assess security requirements and controls and to ensure that security controls are implemented as planned
-Collaborates on critical IT projects to ensure that security issues are addressed throughout the product life cycle.
-Hands-on business analyst for project support of a critical project.
-Under the direction of the department Team Lead and Project Manager, hands-on documentation of key deliverables based on the business processes including project plans, planning calendars, presentations, requirements, communication plans, end user training, policies, meeting minutes, and other documents.
-Handles tactical communications (by phone, email, meetings, etc.) with project team members and other stakeholders or for the Team/Project Leads.
-Handles other communications similar to first-level customer support services during testing, implementation, and warranty phases of the project.
-Works with small regional planning virtual team in meeting the project objectives.
-Strong organizational skills and ability to multitask effectively
-Bachelors degree in Information Systems or equivalent work experience
-Desirable: Security certification
-5 to 7 years of combined IT and security work experience with a broad range of exposure to systems analysis, applications development, database design and administration
-1 to two years of experience with information security
-System expert of Web Filtering- Proxy- Threat Management
-Experience with design, installation and support
-Must be able to perform hands-on support for a wide range of security technologies including, but not limited to: SEIM, IDS/IPS, MSS, Vulnerability scanning, DLP, encryption, Webfiltering
-Participates in technical direction of designing and implementing security solutions for security technical infrastructure
-Monitor, investigate, analyze security systems, detect incidents.
-Member of the Security Incident Response Team
-Participates in all phases of project planning in security service support, including functional requirements, design specifications, testing, implementation into Security Ops