IT Security Analystother related Employment listings - Ashland, VA at Geebo

IT Security Analyst

Job
Summary:
The IT Security Analyst is responsible for recommending, maintaining, and supporting all aspects of technology relating to IT security and information systems security.
They will analyze and create tests, and develop specifications and requirements to ensure the security, stability, integrity, and efficient performance of the systems that support core organizational functions.
Essential Functions:
Recommend and troubleshoot all aspects of security relating to core business applications, including application servers, associated hardware, endpoints, databases, and networks Meet and coordinate with internal and external stakeholders to ensure adequate security controls are incorporated into project scopes, system goals, and requirements Develop, analyze, prioritize, and organize requirement specifications and diagrams for engineers and testers to follow Translate highly technical specifications into clear non-technical requirements Define and coordinate the execution of testing procedures, and develop test cases to serve the overall quality assurance process Provide documentation of all processes and training as needed Develop maintenance procedures to monitor systems health, gather system statistics, and troubleshoot reported errors and alarms, escalating to system owners when necessary Recommend design, implementation, and upgrades of information security systems to meet the business and user needs Determine best practices for scalability, supportability, ease of maintenance, and system performance Involved in compliance and regulatory work as needed.
(NIST, PCI, SOX, GDPR) Keep current with the latest security news / trends relevant to the business Other Functions:
Follows all safety policies and procedures; communicate hazards and/or suggest improvements to Manager Gauge the effectiveness and efficiency of existing systems; develop and implement strategies for improving or further leveraging these systems Ensure that services and infrastructure can deliver the agreed capacity and performance targets in a cost effective and timely manner Collaborate with IT staff to ensure the integrity and safety of software and systems while maintaining business objectives and processes Load test and monitor system performance; prepare and deliver system performance statistics and reports Other duties as assigned Working Conditions:
Normal office environment Equipment/Machinery Used:
Telephone, copier, computer, fax machine, calculator Physical Requirements:
Sitting, standing, bending, manual dexterity, reaching, visual acuity, lifting up to 10lbs Minimum Requirements:
Bachelor (4-year) degree, with a technical major such as computer science, or more than six years hands-on IT security systems analysis experience.
One or more IT systems or security certifications.
Additional Security, Networking, Cloud Infrastructure certifications highly preferred (CISSP, CISM, CCSP, CISA, CPT, CEH, Security Plus) Proven ability to assess business needs and translate them into relevant solutions.
Experience administering, documenting, testing, and training in the use of security systems Strong computer, hardware, software, and analytical skills.
Demonstrated ability to prioritize and effectively manage multiple simultaneous projects.
Ability to work a flexible schedule, including nights and weekends, sometimes with little advance notice.
Limited travel in the US may be required from time to time.
Experience using cloud-based SaaS/IaaS/PaaS solutions preferred.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.