Utilizes experience in order to identify problematic relationships. Anticipates, prevents and eliminates problems and creates efficient fixes. Facilitates elimination of problems and roadblocks before they occur.
The successful candidate must have a very flexible work style, effective verbal and written communication skills, and be able to work comfortably in a team environment. The candidate must have the ability to work in a collaborative environment and across various disciplines.
Lead and/or manage operation related to the Information Security functions including; developing and maintaining policies and standards, configuration of technical controls (related to various security tools).
The IT Systems Analyst ensures the uptime of the business applications that support the CSA process and utilizes their expertise to solve problems and collaborate with cross-functional teams to restore service.
Support the operation of Tennecos IT security infrastructure, services, and programs including Security Event Management program, Vulnerability Management program, intrusion detection and prevention, PKI, certificates, malware protection, web application defenses and data leakage prevention.
The Information Security Analyst will perform allprocedures necessary to ensure the safety of information systems assets and toprotect systems from intentional or inadvertent access or destruction, whileunder limited supervision.
Work closely with IT leaders, technical experts, Talent Management, Fraud. and management on a wide variety of security issues that require an in-depth understanding of the IT environment in their units, as well as the research landscape and federal regulations that pertain to their unit's research areas.
Provide oversight and guidance of IA personnel performing system analysis looking for patterns of non-compliance; ensure appropriate administrative or programmatic actions which minimize security risks and insider threats.
Responsible for creation and maintenance of user accounts and active directory, as well as many other peripheral systems; utilize security rules to grant/revoke access to applications, servers, group folders, etc.