Senior Information Security Analyst (Hybrid) Information Technology (IT) - Philadelphia, PA at Geebo

Senior Information Security Analyst (Hybrid)

Our organization is looking for dynamic individuals who love to learn, thrive on innovation, and are open to exploring new ways to achieve our goals.
If this describes you, we want to speak with you.
You can help us achieve our vision to lead nationally in innovating equitable whole-person health.
The Senior Information Security Analyst will be responsible for:
o Act as the subject matter expert to business areas and technical teams on matters of information security.
Serves as the customer interface for the Information Security Operations Department.
o Strong knowledge of various automated security control systems, encryption, message authentication, vulnerability assessment, intrusion detection, penetration testing, incident response, and manual control procedures.
o Understanding of information security frameworks, network design & architecture, product testing & evaluation, and excellent technical writing ability.
o Expert understanding of Information Security fundamentals, techniques and technologies related to ensuring the confidentiality, integrity and availability of valued information assets.
o Strong knowledge of various automated security control systems, encryption, message authentication, vulnerability assessment, intrusion detection, penetration testing, incident response, and manual control procedures.
o Understanding of information security frameworks, network design & architecture, product testing & evaluation, and excellent technical writing ability.
o Identifies solutions for the most complex client inquiries/business requirements and implements process improvements aligned with information security frameworks and business needs.
Optimizes the use of technology to improve the customer experience.
Develops and maintains strong working relationships with business areas throughout the enterprise on all matters related to information security.
o Provides expert guidance to department management and business lines to ensure compliance and mitigation of risks.
Serves as a key resource and influencer for reviewing contracts, creating technical documentation, presentations and formulating communications.
This includes scoping and costing of mid-level projects, and cost benefit analysis.
o Uses visual aids to convey complex technical topics to large, diverse audiences.
Able to communicate clearly in stressful and highly visible situations.
o Reviews internal information security policies and makes recommendations in anticipation of new security requirements.
Identifies gaps between policy and operating practices.
Drafts local policies, standards, guidelines and procedures to supplement enterprise security frameworks.
Drafts technical documentation including information security reports, white papers, technical notes, implementation and configuration guides for a wide variety of audiences.
o Performs complex Security monitoring, security and data/log analysis, and sophisticated forensic analysis to detect security incidents and initiate incident response.
o Plans, contributes to and participates in security incident plan exercises.
Qualifications:
o Bachelor's Degree in Computer Science, Information Systems, or other related field or equivalent work experience.
o 5 - 8 years of relevant experience.
Often represents the level at which career may stabilize for many years or even until retirement.
o CISSP preferred Advanced knowledge and understanding of the following:
Operating System Skills:
o Linux o Windows Server o Windows Desktop eDiscovery - eMail/FileDiscovery/Incident Response Palo Alto oFirewall Management/Configuration oURL Filtering (Proxy) Management/Configuration oDNS - Blackhole and Geo-Filtering oWildFire - download Analysis through Virtualization and Execution o Experience with SIEM tools such as Microsoft Sentinel o Experience with vulnerability management tools such as Tenable o Experience in Cloud technologies such as Google Cloud Platform (GCP), Microsoft Azure, Amazon Web Services (AWS) a plus.
o Managing and maintaining DNS Zones o Antivirus tools including Microsoft Defender, BitDefender, Microsoft ATP o F5 AWAF expertise o 2 Factor integration experience with solutions from Thales and Microsoft o Securing Linux, Unix and AIX environments o Securing Microsoft Office 365 o Threat Hunting o Network Micro Segmentation o Other duties as assigned Hybrid of Choice:
Independence has implemented a Hybrid of Choice model which provides our associates with the flexibility to choose whether to work remotely, work in the office every day, or work in the office on certain days at their discretion.
However, management may require our associates to work from Independence's physical office locations on certain occasions.
This role is designated as a role that fits into the Hybrid of Choice model.
While associates may work remotely, the work must be performed in the Tri-State Area of Delaware, New Jersey or Pennsylvania.
Recommended Skills Amazon Web Services Antivirus Softwares Architecture Authentications Business Requirements Certified Information Systems Security Professional Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.