Description
Description:
Position Purpose:
The Security Analyst role will play a crucial role in safeguarding our systems, networks, and data from potential security threats. Working closely with our IT teams, you will utilize your expertise to identify and assess security risks, analyze security data, and develop and implement security strategies to protect our organization's technology infrastructure and data.
Essential Functions:
Basic Business Acumen:
• Identify and mitigate security risks by analyzing security events and alerts, executing incident response procedures, and communicating and assisting stakeholders.
• Ensuring enterprise security by ensuring the ongoing usage and maintenance of the various tools and procedures specific to the organization.
• Contribute to data and user lifecycle management efforts to ensure comprehensive security measures are in place.
• Collaborate closely with the team to implement innovative security measures aimed at bolstering the organization's overall security posture.
• Provide valuable support, guidance, and oversight for various cybersecurity initiatives, projects, and teams to drive successful outcomes.
• Maintain accurate records of security procedures and incidents, promptly reporting findings to management for informed decision-making.
• Conduct rigorous phishing simulations to assess users' security acumen, pinpoint knowledge gaps, and evaluate the effectiveness of the training program.
• Assist in evaluating phishing assessment risks, conducting data analytics, and generating comprehensive reports to inform strategic decision-making.
• Stay current with security trends and technologies, evaluating their potential impact on the organization’s security posture.
• Collaborate across departments, teams, and third-party vendors to successfully deliver technology projects and corporate initiatives.
• Serve as Subject Matter Expert (SME) on information security-related projects and initiatives, providing invaluable insights and guidance.
• While this job description accurately represents the current primary duties of the role, functions may be adapted as necessary to meet business needs.
Interpersonal Communication – Communicates effectively with IT Team members, Business partners and 3rd Party vendors. Motivates others, and manages conflict allowing for a focus on planning, risk management, project quality and completion.
Organizational Support – Recognizes and adjusts to change; maintains control of overall agenda but includes others in a task-focused manner; creates a disciplined process.
Efficiency – The job environment is fast paced and results oriented. There will be multiple projects occurring simultaneously.
Collaborative – When necessary, collaboration will be focused on specific tasks or problems. It is important to be able to work with other team members to solve problems.
Job Specific Requirements, Skills, Knowledge, and Abilities:
The individual must possess the following knowledge, skills and abilities and be able to explain and demonstrate that he or she can perform the essential functions of the job, with or without reasonable accommodation, using some other combination of knowledge, skills, and abilities:
• Experience in information security or a related field.
• Strong ability to research technical challenges and learn quickly to provide security guidance.
• Demonstrated ability of analytical expertise, close attention to detail, critical thinking, logic, and solution oriented.
• General information technology and computer networking knowledge preferred.
• Working at a faster than average pace for most of the workday. Must be able to adapt/adjust to continual changes and variety.
• Must be able to speak, read, write, and understand the primary language(s) used in the workplace (English).
• Excellent oral & written technical communication skills.
• Most tasks are performed independently. There is limited direct supervision.
• Strong communication skills in-person, over the phone, and a professional presence onsite as a representative of the IT department.
• Work alongside and maintain a cohesive relationship with technology vendor partners.
• Resourcefulness, creative thinking, and general problem-solving capabilities.
• Utilize the IT change control process, entering change control documents, coordinating their review, approval and execution as related to infrastructure delivery.
• Present ideas and information in a professional, concise, and well-organized way.
• Manage time well; prioritizing tasks to meet deadlines.
• Ability to assess/evaluate individual performance with an emphasis on quality standards and productivity.
Physical Demands:
Physical demands commonly associated* with the performance of the functions of this job.
Most work tasks are performed indoors. Temperature is moderate and controlled by office environmental systems.
Must be able to sit at a desk for up to 5 hours per day. Walking and standing are required the rest of the working day. This includes traveling to and from meetings and air travel. Length of time of these tasks may vary from day to day and task to task.
Must be able to lift up to 45 lbs. occasionally.
Requires grasping, writing, standing, sitting, walking, repetitive motions, listening and hearing ability and visual acuity.
Talking and hearing occur continuously in the process of communicating with both associates and external relationships.
Vision occurs continuously with the most common visual functions being those of near vision and depth perception.
Requires manual dexterity to use and operate all necessary equipment.
Must have finger dexterity to be able to operate office equipment such as computers, printers, smart phones (i.e., iPhone), multi-line touch tone phones, filing cabinets, FAX machines, and photocopiers as needed.
Other: Regular attendance in conformance with the standards, which may be established from time to time, is essential to the successful performance of this position.
Due to the cyclical nature of the industry, associates may be required to work varying schedules to reflect the business needs. In addition, attendance at all scheduled training sessions and meetings is required.
Education
Bachelor’s degree in computer science (or related field) or equivalent experience.
Experience
Minimum 3 years professional experience in IT with a strong understanding of cybersecurity principles, IT systems and networks.