In this role, you will perform information security risk assessments of information technology assets based on the NIST framework. Provide information security subject matter expertise to several teams and business customers on risk assessments, vulnerability remediation, and threat detection techniques.
Conduct information security assessments utilizing ISO 27001 / 27002 or other appropriate information security control structures; develop risk remediation plans, and facilitate risk remediation efforts.
The Business Analyst is a blended role responsible to analyze business requirements, recommend solutions and provide guidance on business demands to the business partner structure that manages the IT portfolio.
Responsible for following established guidelines and identifying and resolving problems. Individual at this level is expected to use some independence of thought but to refer more complex problems to supervisors or other experts.
This position forms part of the IT Operations Datacom Team. The candidate will be responsible for implementing change management and ongoing maintenance of parts of the networking infrastructure for the WAN, DMZ and Internet Edge of the network.
Keeps current and maintains an understanding of industry threats, vulnerability landscape and applicable exploits. Conducts research on emerging products, services, protocols, and standards in support of cyber security enhancement.
The IT Security Analyst is responsible for providing information security services to protect the confidentiality, integrity, and availability of information and technical environments and to support enterprise security goals and objectives.
In this role, the selected candidate will be working within the threat management team and responsible for examining security events for context, relevance, criticality and their potential impact to the company.
Participate in information security incident response, forensic investigation efforts, and malware analysis processes and assists in developing corrective actions and preventative measures for security incidents.
Provide dedicated system administration, networking, programming, cyber research and development, and cyber intelligence gathering / analysis support of multiple ongoing customer programs and internal research efforts.