Manages data reporting tools and developing/delivery of reports. Reviews and analyzes all data to develop and execute support plans to gain access to new sources of data for analysis. Acts as liaison to Business Planning, IT, and BI on all data projects and database support issues.
Architect security systems to protect corporate data against unauthorized disclosure, accidental or intentional loss of data, or unauthorized modification select, oversee implementation, and monitor network, host, and cloud security technologies deployed globally.
Support related technologies and services; create and maintain system documentation for security tools; perform system health checks; create test scripts and support the upgrade of security tools; work on the implementation of related improvements.
Develop continuity of operation (coop)/disaster recovery (dr) plans and supports certification of information systems and networks -supervises operation of electronic key management system, other information security duties, and public key infrastructure.
Architect security systems to protect corporate data against unauthorized disclosure, accidental or intentional loss of data, or unauthorized modification. Select, oversee implementation, and monitor network, host, and cloud security technologies deployed globally.
Support cyber security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff; responsible for maintaining the integrity and security of enterprise-wide cyber systems and networks.
This IT Security Analyst (Awareness and Trainng) is overall responsible for our security awareness and training program. Ultimately this person's job is to reduce risk to our organization by ensuring all employees, staff and contractors know, understand and follow our security requirements and behave in a secure manner.
Must possess expert knowledge in two or more of the following areas: Vulnerability Assessment, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Encryption, Web filtering, Advanced Threat Protection.