The incumbent provides technical support for a mixture of Linux/Windows/Mac System, and the duties include: the implementation, installation, configuration, security, and maintenance of computer hardware, software and networking in a diverse computing environment.
The IT Security Analyst is responsible for providing information security services to protect the confidentiality, integrity, and availability of information and technical environments and to support enterprise security goals and objectives.
Employ innovative thought and automation to improve operational productivity, workflow, system performance and trader support. Participate in the full software development life-cycle of operational monitoring systems.
In this role, the selected candidate will escalate all Major Incidents in the Major Incident Manager or Problem Manager; identify and escalate problems and major failure of servicedentify and escalate problems and major failure of service.
In this role, the selected candidate will ensure continued improvement in information security and cyber security risk management across the TLC, through the continual refinement and implementation of the Information Security and Cyber security Framework.
Build and develop a high-performing information security team by prioritizing a structure that reduces risk to the enterprise; be a talent magnet and attract the very best and brightest business information security professionals; thoughtfully mentor, nurture, develop and challenge the team to grow.
In this role, you will perform information security risk assessments of information technology assets based on the NIST framework. Provide information security subject matter expertise to several teams and business customers on risk assessments, vulnerability remediation, and threat detection techniques.
In this role, the selected candidate will be working within the threat management team and responsible for examining security events for context, relevance, criticality and their potential impact to the company.
Conduct information security assessments utilizing ISO 27001 / 27002 or other appropriate information security control structures; develop risk remediation plans, and facilitate risk remediation efforts.