Information Security Analyst Job at IBML - Imaging Business Machines

IBML - Imaging Business Machines Birmingham, AL 35210

PURPOSE

The Information Security Analyst is to understand the risks associated with collecting, storing, and transmitting data and takes the required steps support risk mitigation.

JOB DESCRIPTION

Primarily, the Information Security Analyst role is responsible for the daily operational monitoring of events and alerts from multiple sources, investigating events and alerts to either remediate or further escalate. This role will manage security of assigned systems to include endpoint protections, network and system logging, monitoring, physical access controls, and other prevention and detection controls as needed. This role will also provide security input for assigned systems during implementation of software systems, to ensure security requirements are met and industry best practices are followed. Additionally, this role is expected to be actively engaged within internal ticketing and traditional end user support needs, as assigned. All members within Enterprise Architecture assist with break fix end-user type ticketing and as such need some level of experience therein. This position requires autonomous critical thinking and problem-solving skills and experience.

ROLE AND RESPONSIBILITIES

  • Active engagement and remediation of internal support tickets, including traditional end user support needs.
  • In all things consider security posture first, whether that involves on-premises or remote workers’ effective and efficient user of ibml toolsets.
  • Investigation of issues including but not limited to: Malware infections, data leakage, internal/external network abuse, SPAM/Email Viruses, Phishing attempts, IPS/IDS Alerts
  • Monitoring and tuning of security alerts from all IT security systems
  • Assist with Risk Assessments of all Enterprise systems
  • Document, audit and validate all security controls, both physical and virtual
  • Validate and maintain accuracy of EDR and SIEM log monitoring with the appropriate vendors
  • Participate in and at times lead SIEM tuning calls with the monitoring vendor
  • Auditing systems for abuse (VPN, Web Filtering, Network Bandwidth, printing systems, etc.)
  • Develop and maintain documentation and procedures of network security systems
  • Advise and assist the VP, Enterprise Architecture in preparation, review, and development of ibml security posture, budgets, and forecasts
  • Recommend security improvements by assessing current situation, evaluating trends, anticipating requirements.
  • Detect, report and track vulnerability remediation to internal systems
  • Work with all business units to educate on and elevate the security and risk posture.
  • Interface with employees at all levels of understanding of technology and Security
  • Evangelize the need for security using a “what’s in it for the users” approach
  • Act as an escalation point of ticketed technical issues as needed
  • Assist VP, Enterprise Architecture and Director, Enterprise Architecture as needed with various projects
  • Perform other tasks as assigned

PREFERRED SKILLS, QUALIFICATIONS AND EDUCATION REQUIREMENTS

  • Bachelor's degree in Computer Science, Information Systems and two (2) years of experience in Information Security or Information Technology, or High school Diploma or GED and four (4) years of post-secondary education and/or experience in Information Security or Information Technology.
  • Solid understanding of information security principles, controls, and technologies.
  • Strong organizational, research, investigative, analytical, and problem-solving skills to properly evaluate situations and appropriately respond.
  • Excellent communication skills.
  • Duo, Fortinet Security Suite (FortiEDR, FortiNAC, FortiMail), and O365 is strongly preferred

ADDITIONAL NOTES

Ultimately, an outstanding candidate should demonstrate sound technical knowledge and curiosity as well as exceptional and effective analytical, communication, and customer service skills.


Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)




Please Note :
stephenwilliam.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, stephenwilliam.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, Site.com is the ideal place to find your next job.