Search by job, company or skills

Information Security Analyst III

Cambium Learning Group

    Highlights

    Job Description

    More Info

    Recruiter Info

4-7 Years
2 months ago
474 Viewed
49 Applied

Job Description

  • Assesses the company s existing security measures and identify vulnerabilities within the company s systems and networks.
  • Develops and implements security policies, standards and procedures to safeguard against unauthorized access, modification and destruction of information assets.
  • Monitors systems for potential security breaches; investigate incidents, identify threats, and take appropriate action to mitigate risks.
  • Helps to manage all remediations related to IT security controls execution.
  • Coordinates 3rd party security audits.
  • Coordinates 3rd party pen testing services.
  • Runs the roll out of new security tools and processes.
  • Creates and manages security awareness training campaigns.
  • Creates and manages phishing simulation campaigns.
  • Heads risk assessments and leads in the development of risk treatment plans by working with asset owners.
  • Runs technical and management support for investigating security incidents, e.g., phishing attacks, DDoS attacks, data leaks, account compromises, etc.
  • Provides technical leadership in the operations of our security operations center (SOC).
Job Requirements:
  • Bachelor s degree in information security, computer science, engineering, or related technical field with 4-7 years of relevant experience.
  • Possess one or more information security certifications such as CISSP, CISA, GIAC, CompTIA Security+, CCSP, AWS certification.
  • Excellent communication, presentation, and documentation skills.

Knowledge Requirements:
  • Data backup and recovery.
  • Business continuity and disaster recovery continuity of operations plans.
  • Intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • Controls related to the use, processing, storage, and transmission of data.
  • Network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Measures or indicators of system performance and availability.
  • Network traffic analysis methods.
  • Skill in creating policies that reflect system security targets.
  • Information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.
  • New and emerging information technology (IT) and cybersecurity technologies.
  • Current and emerging threats/threat vectors.
  • Vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
  • System and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Penetration testing principles, tools, and techniques.
  • AWS security architecture and tools and Microsoft Azure security architecture and tools.
  • Knowledge of one of more security frameworks, e.g., ISO-27001, NIST Cybersecurity Framework, PCI-DSS, SOC2, CIS Controls, NIST SP 800-53, etc.
INDUSTRY
Follow
Save
Report

Similar Jobs

Information Security Analyst I

Company Name Confidential

People also considered

DelhiBengaluru / BangaloreNoidaMumbaiHyderabad / Secunderabad Telangana
Last Updated: 26-06-2024 09:29:20 AM
Home Jobs in Remote Information Security Analyst III