Are you hiring?Employers Click Here!
Information Security Analyst
Associates degree in Information Systems or similar field or technical school; and two years experience in monitoring networks for security threats or unauthorized users. Two years of experience in Information Technology at an enterprise level. Certifications (minimum 1) for network security such as CEH, CCNA, CISSP, GIAC Certs or similar. Ability to type 25 words per minute. Ability to read, write and speak in English. Ability to read, analyze and interpret technical procedures, program specifications, and implementation standards. Ability to communicate verbally both in person and on the telephone in terms which end users understand. Ability to complete forensic analysis relating to security threats or potential data breach. Ability to apply concepts to determine and test reliability and validity.
Financial Services experience
Supports the Information Security program in the proactive monitoring of our network, access controls, and information security controls. Primarily responsible for monitoring aggregation and correlation software for first response, prioritization and escalation of security threats. Oversees the vulnerability management program by communicating new security threats to the appropriate work teams and then validating the remediation process. Assists in the prevention and resolution of security threats. Maintains security documentation. Monitors and improves existing security tools. Assists with the resolution of security audit findings.
Network Security and Access Controls: Detect, prevent and resolve security threats within the network. Pro-actively monitors firewalls and access points. Monitors aggregation and correlation software. Audits security settings to ensure compliance with all applicable policies and procedures. Responsible for the administration of VPN and other remote access points.
Information Security: Monitors the network for out of compliance documents and files. Monitors network traffic and drive locations and devices for appropriate data encryption. Conducts regular data audits. Helps develop and administrate the Security Information and Event Management (SIEM) software.
While performing the duties of this job, the employee is regularly required to sit; use hands to finger keys accurately when using calculator machines or computer keyboards; reach with hands and arms. The employee must occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, color vision, depth perception, and ability to adjust focus. The noise level in the work environment is usually moderate. Must be able to travel independently to department and branch locations. NOTE: The requirements listed in the above qualifications and essential functions are representative of the knowledge, skill, physical demands or work environment required or encountered that must be met by an employee to successfully perform each duty and each function of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform these essential functions.
333 N 44th Street Phoenix AZ 85008