[Close] 

Security Analyst

Job Summary Applied Systems, Inc., a worldwide leader in insurance technology, is currently searching for a Security Analyst to be the key link between the business, Internal IT, Application Development, and Data Center Operations.  In this role, you will lead and facilitate all activities that the Information Security Program delivers in support of the business, including the implementation of information security policies, procedures, standards, technical safeguards, and solutions identified to mitigate or reduce business exposure to information securityrisks.  You will report the status on the implementation of the Information Security Program to the ISO and as directed to the Legal, Privacy, and Management teams. You will also be relied upon to research information securityarchitecture, technologies, practices, and strategies needed to support this methodology.     Additional responsibilities include: Identify gaps within the Security Program and recommend changes, where appropriate, to security control standards or operational practices Work with various groups to establish and maintain security standards based on Applied's Information Security Standards Participate in security incident response process for any internal/external security alerts, threats to brand integrity, and attacks on customer services Oversee the security of networks, servers, workstations, and various security functions Conduct securityrisk assessments (identifying problems the organization might face), vulnerability assessment (determining the organization's weaknesses) and defensive planning (implementing preventative and detective countermeasures) Provide technical guidance in relation to information security controls for operating systems, development processes, coding practices, access control, networkinfrastructure, security tools for reactive, proactive, and detective security controls Evaluate & provide guidance on laws & regulations in areas of information protection Provide support for information security projects and requirements   Requirements: Bachelor's Degree in Computer Science, Information Systems, Management Information Systems, or related subject areas; or equivalent work experience 3-5 years of experience in information security assessments, incident response, threat intelligence, security control implementation, and network design & integration Experience with vulnerability scanning; Security Information Event Management (SIEM) rule creation and log analysis; Firewall rule reviews (Cisco); Virtual Private Networks (VPNs)architecture; Identity and Access management; Encryption solutions; Data Loss Prevention (DLP) strategy; and Mobile Device Management (MDM) implementationIndustry-specific certifications ideal but not required, including: CISSP, CISM, GCIH,GCFA, GIAC, or CEH Extensive experience with Microsoft's Active Directory environment a plus
Salary Range: NA
Minimum Qualification
Less than 5 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.