Sr Info Security Analyst
Responsible for effectively planning, designing, implementing and monitoring security technologies and projects that support the firms' underlying security policies and procedures. Design, document and implement appropriate security policies and standards that protect the firms' information assets. Utilize highly technical and physical forensics to ensure that security policies, standards and best practices are followed throughout the technology organization-including where vendors are utilized to provide services. Responsibilities
Serve as a security expert on application development, database design, network and/or platform (operating system) projects, helping project teams comply with enterprise and Technology security policies, industry regulations and best practices. Through a deep understanding of the business requirements, identify the appropriate security requirements for each project. Design, develop and lead the testing approach and execution plan to ensure that new and existing solutions meet security requirements.
Design, oversee and/or perform comprehensive risk/vulnerability systems assessments to identify vulnerabilities, including providing reporting on assessment results as well as risk mitigation and remediation recommendations and plans. Keep current with emerging security trends, issues and alerts. Communicate known security risks and solutions to mitigate risks to business and technology partners as needed. Manage audits of vendor security processes, procedures and compliance controls
Analyze application security needs based on the sensitivity or proprietary nature of the data and work with the appropriate teams to develop and execute new or existing security technologies or processes to support the business strategy. Participate in network architecture reviews and develop detailed security engineering design and deployment plans. Design, test, implement, maintain and support current and future information security technologies, processes and procedures.
Manage effective relationships and works in partnership with leadership, team members, vendors, and contractors to deliver robust technical solutions ensuring that service level commitments and project time lines are maintained. Provide technical expertise, leadership, direction and prioritization of work to team members ensuring outstanding service delivery.
Frequently mentor, coach and contribute to the development of peers and other team members.
Responsible for the configuration of security controls to ensure the safety of information systems assets and to protect from unauthorized access or intentional destruction. Develop, implement, maintain and oversee the enforcement of all technology information security policies, procedures and associated plans based on industry standards, best practices and legal compliance requirements. Implement changes to existing security policies a
Assist and/or lead projects related to information security regulatory compliance and the implementation and maintenance of all information security programs, processes and technologies. Assess and document the need for all security configurations or re-configurations and work with appropriate teams to execute them as required. Research, design and advocate new security technologies, architectures and security products that will support the security requirements of the firm.
Assume the subject matter expert (SME) role in the management, investigation and response to suspected and actual information security breaches or system failures. Using data collected from a variety of tools, provide forensic analysis of security events. Analyze security incidents to determine root cause and identify process or system changes to prevent reoccurrence. Recommend and schedule fixes, security patches, disaster recovery procedures and other required measures in the event of a security breach Required Qualifications
• Bachelor's degree in computer science, MIS, Technology Forensics, or related technical field; or equivalent work experience.
• 5+ years of relevant experience required.
• 3+ years' experience evaluating and designing security solutions for technology projects.
• Experience in AWS or Cloud Security certification or working knowledge on AWS
• Demonstrated understanding of security related technologies and practices, including: authentication and authorization systems, endpoint protection, encryption, segmentation strategies, vulnerability management, secure remote access, and fire walls.
CISSP, ISO 27001
CISM, CISA Preferred Qualifications
CISSP, CISA, CISM, CRISC, or equivalent security certification.