Back
Job   USA   WA   Richland Area   Analyst   Fruitsmart -

Information Security Analyst | Analyst in Technology Job at Fruitsmart in Prosser WA | 7116435505

This listing was posted on ApplicantPro.

Information Security Analyst

Location:
Prosser, WA
Description:

GENERAL DESCRIPTION Within the region serve as primary contact for security related issues, remediation, and documenting incidents. Serve as secondary security contact based on time of day for adjacent region of operation, i.e. Asia. Assesses information risk and facilitates remediation of identified vulnerabilities for our networks, systems, and applications. Reports findings and recommendations for corrective actions. Identifies opportunities to reduce risk and documents remediation options regarding acceptance or mitigation of risk scenarios. Performs vulnerability assessments as assigned utilizing IT security tools and methodologies. Facilitates and monitors performance of risk remediation tasks, changes related to risk mitigation and reports on findings. Evaluates security posture of platforms, software, and external service to ensure security compliance with our policies. Assists in all IT audits and risk assessments. Provides follow up to completion on outstanding issues: Job Duties and Responsibilities Analysis of security related materials relating to incidents, deployment of new products, corrections to new or existing systems or platforms. Reviewing and responding to security service tickets and requests for validity, risk assessment of request, action item(s) to facilitate or remediate incidents by applying or prescribing necessary remediation steps. Reviewing software submitted for approval including verifying security state of requested/provided software. Ensuring submission follows policy and procedures. Providing details on submission form as to status of software and feedback on results. Reviewing security alerts to determine source, cause, status and needed remediation. Correlating and verifying across systems and respective logs Deploying security agent client software to assets at all locations. Working with both site IT and HQ IT to facilitate, schedule and apply. Reviewing all aspects of agent deployments and system to identify issues associated with systems and agents. Determine issue(s) and contact system owners to remediate issues, including scheduling system changes and/or reboots Address questions and issues raised from internal and external audits Reviewing vulnerability scan findings to prioritize elevated risk level issues Execute scheduled internal and external vulnerability assessments of sites utilizing commercial and open-source tools, complete with findings and remediation plan, follow up with sites to verify remediation Verify vulnerability assessments using commercial and open-source penetration testing tools validating exploits to demonstrate vulnerability exists (within reason and without causing production outages) Proactively opening tickets: apprising site contacts of found issues; prescribing remediation or mitigations; offering assistance both in planning, testing, deployment and follow up/maintenance Analysis of network traffic utilizing existing tools (recommending new as needed) Follow up on security incidents, systems with repeated issues, documenting issues, notify system owners, identify resolution, verify remediation Review Active Directory: privileged group memberships; privileged user account details; changes; irregularities, associated logging configurations and alerting. Review network, computers, applications, and other IT systems to ensure compliance with policies Enrollment of identified systems for inclusion in collecting pertinent log details to SIEM Monitoring centralized logging systems for events, creating alerts, adjust logging, reviewing for improvement, additions, and changes. Ensuring critical systems are logging as expected, with no issues, Validation of proper operation of "backend" support systems to ensure no capacity issues, updated to most current stable updates and configuration Providing log retention as required by service agreements including preservation in conjunction with instances where legal action may be required Validating deployments are in accordance with industry best practices and ensuring compliance with company policies and procedures Updating or creating documentation for setup of existing and new products, changes, validation methods, risks associated Writing appropriate remediation procedures as determined during security service ticket resolution and incident response work Provide end user education via presentation and documentation Assist in the assessment and acquisition of information security hardware and software Research new and proposed security tools, applications, procedures, and methods for possible incorporation into overall framework. Reviewing existing policies and procedures to ensure updates for applicable standards and industry best practices Review existing policies and procedures to ensure updates for applicable standards and industry best practices Review network, computers, applications, and other IT systems to ensure compliance with our policies Provide methods and procedures for hardening network infrastructure, systems, and applications. Documenting current and changed configuration plans. Planning for future expansion needs: including in-house and externally hosted systems Provide detailed proposals for implementing system, platform, or companywide changes. Serve as project and/or platform manager for IT security requirements Stay current on emerging threats and countermeasures, monitor, and assess security risks to Universal's networks Research and review products and services to provide solutions to existing and new issues Ensuring valid testing of patches, updates or new configurations on test group(s) or candidates prior to pushing to production Promote adherence to Company Policies through action and deed Report any violations to the Corporate Compliance Program in a timely fashion Administration of designated data privacy platform for inventory process compliance Validating input to data privacy platform Working with business owners to document and determine protections in-place for in-scope processes Identifying and making recommendations on improvements for protections and monitoring for identified processes work Experience and Personal skill requirements 3 - 5 years working experience in an IT environment Working experience in secure networking, system hardening, security: architectures, policy and procedures, applying industry standard best practices securing systems Experience conducting vulnerability assessments and security reviews, reporting findings and follow up with remediation plans Experience deploying application firewalls, IPS, VPN setup, host firewalls, access control lists and wireless technology, knowledge and use of authentication and encryption protocols Experience configuring security-based logging and monitoring Working knowledge of operating systems including UNIX/LINUX, Microsoft Operating Systems, Checkpoint Firewall Experience with incident response, documentation, investigation, and remediation Demonstrated security policy/program creation to include policy updates to maintain current posture Knowledge of system, application, and network vulnerabilities and associated countermeasures Ability to handle multiple tasks, adjust to shifting priorities and demands while meeting deadlines Project Management: Demonstrated ability to plan, develop and implement projects Ability to work and solve problems independently, and within a team environment Education requirements Bachelor's degree in computer science, Programming, or a related field required B.A. in Information Systems preferred. At least three years of experience in computer systems with some specialization in computer security highly preferred.
Company:
Fruitsmart
Posted:
December 26 2023 on ApplicantPro
Visit Our Partner Website
This listing was posted on another website. Click here to open: Go to ApplicantPro
Important Safety Tips
  • Always meet the employer in person.
  • Avoid sharing sensitive personal and financial information.
  • Avoid employment offers that require a deposit or investment.

To learn more, visit the Safety Center or click here to report this listing.

More About this Listing: Information Security Analyst
Information Security Analyst is a Technology Analyst Job at Fruitsmart located in Prosser WA. Find other listings like Information Security Analyst by searching Oodle for Technology Analyst Jobs.