New Role for Security Analyst at Remote, Remote, USA |
Email: [email protected] |
From: Sunita Rani, Scalable [email protected] Reply to: [email protected] Security Analyst OH Review firewall and proxy requests and evaluate for adoption to ensure that they conform to customer security policy and security best practices. Ability to assess business and technical requests and evaluate the risk to ensure effective and pragmatic security mitigations are in place or work with requestor to provide remediation requirements to meet the business objectives. Represent Security Team in change and incident processes, evaluate for adoption to ensure that they conform to customer security policies and security best practices. Ability to translate technical information to business language. Assist overall Cyber Security functions as directed. Must display enthusiasm and interest in IT Security Participate, review, and evaluate risk, and provide security recommendations in the Change Review process Perform. Application vetting (Business and OT) Assist with the update of operational and technical documentation. 4 years experience in Information Security and Information Technology Strong communications skills Ability to translate technical information to business language. Functional experience in ITIL processes Functional experience in Service Now and SecOps Module. Maintain to exceed Service Level Objective and Service Level Agreements with customers, partners, and stakeholders. Ability to communicate and collaborate effectively with other team members in a geographic and culturally diverse workforce. Expected to work occasional nights, weekends, holidays, and overtime. Expected to perform on-call duties. Ability to respond to critical incidents 24/7 Strong sense of professionalism and ethics Competencies: Cyber Security Experience (Years): 4-6 Essential Skills: Responsible for ensuring the security of information systems assets, to protect systems from intentional or inadvertent access or destruction. Review firewall and proxy requests and evaluate for adoption to ensure that they conform to customer security policy and security best practices. Ability to assess business and technical requests and evaluate the risk to ensure effective and pragmatic security mitigations are in place or work with requestor to provide remediation requirements to meet the business objectives. Represent Security Team in change and incident processes, evaluate for adoption to ensure that they conform to customer security policies and security best practices. Ability to translate technical information to business language. Desirable Skills: Review firewall and proxy requests and evaluate for adoption to ensure that they conform to customer security policy and security best practices. Ability to assess business and technical requests and evaluate the risk to ensure effective and pragmatic security mitigations are in place or work with requestor to provide remediation requirements to meet the business objectives. Represent Security Team in change and incident processes, evaluate for adoption to ensure that they conform to customer security policies and security best practices. Involve senior peers in circumstances where there is uncertainty in the approach or decision evaluating Service Now tickets, particularly Incident and Change requests. Clear understanding of the customer policies, standards and procedures maintained on the web site. Establish and continually evolve the ongoing processes and procedures for Global firewall and proxy change requests. Use ticketing system for documenting and processing requests and incidents. Use existing tools and procedures to verify IT infrastructure and applications are compliant to IT Policy; apply network & server administration skills and knowledge to guide system level administrators in IT Policy compliance. Articulate impact and requirements of IT assets as it relates to requests and involve more senior level team members at appropriate times for recommendations on approval decisions. Support the Vulnerability Remediationo Schedule, coordinate, and track the remediation of open vulnerabilities for assetso Coordinate the assignment of vulnerabilities for assets owned by Security applications and tools to the respective teams for resolution.o Monitoring of metrics and performance indicators for the vulnerability remediation, including reports to the appropriate management and team Keywords: information technology Ohio New Role for Security Analyst [email protected] |
[email protected] View all |
Mon May 13 22:06:00 UTC 2024 |