Search for More Jobs
Forward job to a friend
Apply without Registering
Apply by creating/using an account
Please enter your registered email address, and we'll email you a link to reset your password right away.
L3 Security Analyst
Location : Topeka, KS
Type : Permanent Full Time
Salary : 110k
Minimum of 3 years IT or network/server experience. Bachelor's degree in information systems or equivalent work experience. Knowledge of and experience with server security, network security, and vulnerability assessments is preferred. Knowledge of the fundamentals of project management, and experience with creating and managing project plans (Agile). Technical knowledge of mainstream operating systems and a wide range of security technologies, such as network security appliances, anti-malware solutions and desktop security tools. Experience in developing, documenting and maintaining security policies, processes, procedures and standards is a plus. Knowledge of server/network infrastructure, including routers, switches, firewalls, and the associated network protocols and concepts. Application integration, workflow design, connectors, reconciliation, reports, attestation. Integration experience with Active Directory and Legacy applications. Nexpose, Java, JSP, XML, LDAP, SQL, Unix, NT background. Ability to interact with personnel at all levels and across all business units and organizations, and to comprehend business imperatives. Strong written and verbal communication skills. A good customer/client focus, with the ability to manage expectations appropriately, to provide a superior customer/client experience and build long-term relationships.
Job Responsibilities :
Performs periodic quality assurance on security operations vulnerability management and problem resolution tasks. Works with business units and with other risk functions to identify security requirements, using methods that may include risk and business impact assessments. Components of this activity include but are not limited to communication, facilitation and consensus building. Assists in the coordination and completion of security operations documentation. Works with security leadership to develop strategies and plans to enforce security requirements and address identified risks. Reports to management concerning residual risk, vulnerabilities and other security exposures, including misuse of assets and noncompliance. Plays an advisory role in application development or acquisition projects to assess security requirements and controls and to ensure that security controls are implemented as planned. Collaborates on critical IT projects to ensure that security issues are addressed throughout the project life cycle. Works with IT department and members of the security team to identify, select and implement technical controls. Develops security processes and procedures, and supports service-level agreements (SLAs) to ensure that security controls are managed and maintained. Advises security administrators on normal and exception-based processing of security authorization requests. Researches, evaluates and recommends information-security-related hardware and software, including developing business cases for security investments. Additional Duties - Depending on the scope of the role, the Security Analyst II may be asked to fulfill one or more of the following duties: Leadership - Coordinates Security Administrator activities to ensure vulnerability management (operations and/or partnering with outsource and/or off shore resources) and problem resolution SLAs are met. Incident Detection and Response - Provides second and third-level support and analysis during and after a security incident. Assists security administrators and IT staff in the resolution of reported security incidents. Participates in security investigations and compliance reviews, as requested. Monitors daily or weekly reports and security logs for unusual events. Develop a comprehensive vulnerability assessment program that is operationally managed on shore and off shore in support of Information Security. This includes penetration testing, reporting
Apply by creating/using an account