Information Security/ Server Analyst II

US-TX-Carrollton
Job ID
2017-1383
# of Openings
1
Category
Computer and Mathematics

Overview

The Information Security Analyst II is responsible for reviewing system logs compiled from SIEM, IDS, and DLP systems, developing and documenting baselines used to quickly identify anomalous behavior within the environment, identifying, researching, and responding to alerts from monitoring systems in order to remediate threats, supporting data collections for SOX, PCI, FedRAMP, COBIT, and other regulations, researching compliance controls, documenting and reviewing standard procedures and reviewing and documenting access request changes.

Responsibilities

  • Must stay up to date on the latest security trends, vulnerabilities, privacy legislation, and news items and communicate new finding with other team members.
  • Documents policies, procedures and standards based upon guidance from Corporate Security Management.
  • Recommends changes in security policies and practices in accordance with changes in law or financial sector security practices.
  • Ensures that data is protected from unauthorized modification, destruction and disclosure.
  • System Auditing and monitoring of critical security systems: IPS/IDS, Event Logs, AV logs, Web Logs.
  • Perform risk assessments and test security controls and systems, including working with process owners to define remediation plans.
  • Respond to critical computer security incidents by collecting, analyzing and preserving digital evidence.
  • Answer user questions related to security technology and advise on the security impact of technical changes.
  • Ensure that security policies are applied and maintained for network devices, remote access devices, firewalls, servers and workstations.
  • Research mechanisms and tools for control compliance.
  • Conduct periodic audits of business entities to ensure continued compliance.
  • Continuous monitoring and research of real time alerts.
  • DLP and IDS administration.
  • Track and report of policy violations.
  • Collaborate with other departments within Securus to ensure the timely delivery of audit materials on a monthly, quarterly and annual basis.
  • Manage repository for control documentation and update documents as needed.
  • Perform internal control testing to validate design and operating effectiveness and document results in the repository on a timely basis.
  • Participate in post-mortem reviews and ensure lessons learned are integrated into the regulatory compliance process.
  • Assist Information Security Supervisor with Security related projects as necessary.

Qualifications

Recommended Skills

  • Experience with Linux, Windows, Active Directory security configuration and design, monitoring/alerting, intrusion detection, encryption, vulnerability management and wireless network security.
  • Ability to identify and recommend mitigations for vulnerabilities and exploits.
  • Expert knowledge and experience with Anti-Virus/Anti-malware products.
  • Knowledge of Information Security principals and activities
  • Ability to work with urgent deadlines.
  • System administration experience is a plus.
  • Knowledge and experience with various standards (PCI/DSS, SOX, FedRAMP HIPAA, CJIS etc.)
  • Advanced Microsoft Office skills – Excel, Outlook, Word.
  • Project Management certifications a plus, but not required.
  • Broad knowledge of Information Technology departments in mid to large organizations.
  • Knowledge of McAfee DLP and ePolicy Orchestrator.

Required Skills

  • Experience with Firewalls, IDS/IPS, VPN, and other network security components from an evaluation, deployment assessment, and audit perspective.
  • 5+ years’ experience in Information Technology; 2+ in an Information Security role.
  • Working knowledge of network infrastructure and security monitoring tools.
  • Information Security certification required. Security certifications may include, but not be limited to CISSP, CISA, CISM, GSEC, Security+, and CEH.
  • Experience with threat assessment, vulnerability analysis, risk assessment, information gathering, correlating and reporting
  • Ability to manage changing workloads while maintaining a sense of priorities and delivering quality service within required timeframes
  • Ability to learn new technologies and applications and apply that knowledge to daily workflows
  • Attention to detail, organized and able to work and research independently
  • Demonstrated adaptability, analytical and problem solving ability, and attention to detail.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin.

 

#dipost

 

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed