Information Security Analyst II

Location: Memphis, TN
Date Posted: 05-06-2019
Job Description
 
Responsible for installing, implementing, administering, monitoring, and maintaining all security architecture technology solutions at an advanced level. Investigate, document, and report threats and vulnerabilities. Provide internal security assessments of all new technology, processes, systems, and projects.  Models appropriate behavior as exemplified in Mission, Vision and Values.
 
Knowledge/Skills/Abilities
  • Extensive knowledge of security architecture technology solutions such as firewalls, intrusion prevention systems, Security Information and Event Management (SIEM), vulnerability scanning and management, anti-virus management, certificate management, and data loss prevention (DLP).
  • Ability to assess security incidents or risks, gathers needed information, and finds appropriate solutions.
  • Ability to analyze processes and recommend improvements based on foundational knowledge.
  • Ability to manage small projects and implementations with little supervision.
  • Advanced computer, network, and system knowledge and skills with a thorough understanding of security controls.
  • Ability to use basic office productivity tools and manage time.
  • Ability to communicate project status to management and other stakeholders. Present in front of small groups. Document processes.
Key Job Responsibilities
  • Installs, implements, administers, monitors, and maintains all security architecture technology solutions.
  • Monitor network, systems, and logs to ensure availability to all systems. Investigate and respond to all potential incidents in accordance with prescribed procedures and perform data forensics to help determine scope and root cause of the security incidents.
  • Facilitate periodic risk assessments, penetration tests, and vulnerability assessments and make security enhancement recommendations to management.
  • Research, evaluate and recommend information-security related hardware and software to maintain a strong security posture, including developing business cases for security investments.
 
 
Education/Training/Experience
  • Minimum AS degree in Information Technology or related field.  Preferred BS in Computer Science, Business, Health Care or closely related discipline. OR, five years of applicable information security experience in designing, deploying, managing, monitoring, and evaluating advanced cybersecurity solutions is allowed.
  • Must have at least two years of information security experience in designing, deploying, managing, monitoring, and evaluating advanced cybersecurity solutions.
  • Certified as a Security+, CISSP, CISM, CEH. or GSEC is required.  OR five years of applicable information security experience in designing, deploying, managing, monitoring, and evaluating advanced cybersecurity solutions is allowed.
Preferred:
  • BS in computer science, Business, Health Care or closely related discipline.
Physical Requirements
  • Subject to call back at all times.
  • Required to sit for extended periods.
  • Subject to standard office working conditions with intermittent exposure to noisy computer equipment.
  • Ability to withstand occasionally stressful working conditions due to tight project schedules and hardware or software problems.
  • Ability to understand complex verbal and written communications, and respond verbally or in writing as appropriate.  Typical mediums of communication include face-to-face dialog, telephone, memos, and electronic mail.
  • Ability to read and understand technical manuals and other documentation to determine correct action, safety precautions, and other conditions of proper hardware and software operation.
  • Ability to work varying hours due to the accessibility of individuals or equipment involved in different projects, the need to minimize system downtime or user interruption, or to recover from hardware or software failures.
  • The physical requirements of this position are: ability to occasionally lift and/or move equipment up to 25 pounds without assistance.  Must occasionally lift and/or move equipment up to 40 pounds with assistance.
  • Ability to occasionally crouch, kneel, bend and/or crawl to access, inspect, connect, position or perform other operations on equipment.  Some locations, such as user or equipment locations, may present very close quarters.
  • Subject to regular periods of repetitive hand motion in the operation of computer terminals and other equipment.
  • Must be able to travel to any area of the organization, both local and remote as needed.  Must provide own transportation.
this job portal is powered by CATS