3+ years of experience with security systems technologies
Experience with Third-Party Risk Management questionnaires and risk analysis
Experience conducting Risk Assessments and collaborating on risk determination for systems, data sets, and applications
Experience with Microsoft Purview for DLP, Sensitivity Labeling, Insider Risk Management, and Data Security Posture Management
Experience maintaining documentation (Risk register, SOPs, As-built, program guides, etc.)
Certified Risk in Information Security Systems Control (CRISC) Certification
Preferred Skills:
Bachelor's or Master's Degree
ISACA, SANS, ISC(2), or CEH certification
Job Description:
Maintains systems to protect data from unauthorized users, identifies, investigates, reports, and resolves security violations.
Researches information security standards and technology trends.
Conducts security and vulnerability analyses and risk assessments.
Upgrades security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements.
Maintains security by monitoring and ensuring compliance to standards policies and procedures.
Contribute efforts towards preventing data loss and service interruptions by research, analysis, development, documentation, testing, or modification of technologies, systems or programs based on design specifications that will effectively protect the network.
Prepares system security reports by collecting, analyzing and summarizing data and trends.
Works closely within the Security team to develop, implement, administer and maintain policies and procedures for ensuring the security of the company's data
Protects against data loss and service interruptions by researching new technologies that will effectively protect the corporate network and applications.
Works with end users and project teams to determine the needs of individual departments; May implement policies and procedures as well as track compliance throughout the organization.
Analyzes IT security logs, reports, and other data sources to ensure that all applications are functional and secure.