The ideal candidate thrives on being in the critical path supporting multi million dollar IT investments, leverages experience and technical knowledge, builds and improves processes, tools and automation, applies legal and contract negotiation skills to bring desired results.
In this role, the selected candidate must have experience on threat management platforms & vulnerability management platforms, experience with open sources and commercial threat intelligence sources and platforms.
In this role, the selected candidate will analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident.
In this role, you will be responsible for developing proposed system design and interface specifications based on identified business needs using structured analytical techniques, employing technical and specific business knowledge.
In this role, you will be responsible to perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
The Regional IT Systems Analyst is responsible in providing the information requirements and systems needs of the North America my REMIT business; he will provide the day to day systems applications support ensuring that it is running smoothly.
In this role, you will develop mobile security guidelines, requirements and standards for mobile product development, as well as enterprise mobile deployment and proactively mitigate risks associated with information security.
In this role, the selected candidate will establish collaborative working relationships with the businesses, functions and regions to ensure that IT solutions align with security architecture and business strategy.
In this role, you will be responsible to develop and implement policies procedures, processes, programs, and practices to guide the bank toward mature IT governance consistent with industry laws and regulations. Central to the technology's organization's success in effectively managing IT risk and meeting regulatory expectations.
In this role, you will develop plans and implement systems and procedures to effectively secure company information, virtual infrastructure, intellectual property, and users against accidental or unauthorized modification, destruction or disclosure.