US
0 suggestions are available, use up and down arrow to navigate them
PROCESSING APPLICATION
Hold tight! We’re comparing your resume to the job requirements…
ARE YOU SURE YOU WANT TO APPLY TO THIS JOB?
Based on your Resume, it doesn't look like you meet the requirements from the employer. You can still apply if you think you’re a fit.
Job Requirements of Information Security Analyst/Administrator:
-
Employment Type:
Contractor
-
Location:
Mason, OH (Onsite)
Do you meet the requirements for this job?
Information Security Analyst/Administrator
Careers Integrated Resources Inc
Mason, OH (Onsite)
Contractor
Duration:0-6 month(s)
JOB TITLE: Information Security Analyst
Work Hours: 8-5pm (40 hours per week)
Start Date: Immediately
Hybrid - 3 days a week - no relocation expenses.
Location: Mason OH
GENERAL FUNCTION
The IS Application Security Analyst will support the execution, planning, and administration of the Vulnerability Management function within Information Security (IS). The Vulnerability Management Analyst executes core processes in the vulnerability management program focused on vulnerability assessments, penetration testing and social engineering. Additionally, they will support the remediation of vulnerabilities resident within systems to minimize the organizations potential attack surface for exploitation.
The Analyst will provide oversight, drive, facilitate and coordinate the management of vulnerabilities across the enterprise. The Analyst must understand underlying application code approaches in order to effectively review and respond to application security scans. While technical involvement is required, this role is not intended to perform direct remediation. The Analyst will support automated scans and may provide post-development testing assistance to validate that vulnerability remediation efforts are appropriately tested.
MAJOR DUTIES AND RESPONSIBILITIES
Monitor and analyze vulnerability assessment data to identify and communicate technical risks to the organization
Support the identification and impact classification for new vulnerabilities identified in the environment
Execute and support vulnerability assessments, penetration testing and social engineering activities
Provide the Information Security and IT Security team information on the emerging cyber threat landscape, including threat actor tactics, techniques, and procedures
Review and interpret application security scan results with an understanding of underlying code structures to provide effective feedback
Provide post-development testing support to ensure vulnerability remediation items are validated and tested appropriately
Facilitate vulnerability management processes by tracking and coordinating remediation efforts across multiple teams
Ensure timely closure of security gaps by working with application, infrastructure, and operations teams
Support IS in achieving the vision and strategic objectives of the vulnerability program
Conduct analysis, aggregate and report on vulnerability data from various scanning tools and platforms
Manage and utilize IS tools such as DLP, Code scanner, external security profile, etc. to analyze gaps in security controls
Participate in the IT SDLC program to ensure that security is included in project by default and by design
Develop strong working relationships with other departments and potentially clients across the organization to ensure a high degree of security compliance client satisfaction
Assist with regulatory and compliance requirements, contributing to security audits, assessments, attestations, certifications and client vulnerability inquires
Brief IS leadership on vulnerability assessment results and potential risks
Support leadership to identify capability gaps in vulnerability management services
Collaborate with cross-functional teams to improve security posture and embed security into existing IT and operational workflows
Continue self-development of knowledge, skills and abilities to better support execution of the Information Security (IS) function
Additional Job Details:BASIC QUALIFICATIONS Bachelors degree computer science, IT or equivalent 3+ years of experience in IT or IS or Compliance Experience with major standards such as: SOC 1-2, ISO 27001/2, PCI DSS, HITRUST, SANS, NIST Demonstrated experience in implementing compliance frameworks for financial services organization or organizations with similar information security needs and requirements Familiarity and understanding of broad range of IT hardware and software products Strong project management skills Excellent presentation, verbal communication, and written skills Excellent analytical and problem-solving skills Experience managing typical enterprise security and intrusion detection systems Ability to work in a collaborative environment across business and technology teams Ability to interpret application structures and code approaches at a high level in order to review and respond to scan results PREFERRED QUALIFICATIONS Certified Information Systems Security Profession (CISSP), PCI DSS, Certified HIPAA Privacy Security Expert (CHPSE), Certified Information Security manager (CISM), Global Information Assurance Certification (GIAC), or related. Experience or knowledge with healthcare or health insurance Knowledge of CMS and HIPAA related vendor requirements Working knowledge of Security SDLC tools
Get job alerts by email.
Sign up now!
Join Our Talent Network!