Ref ID: 00340-0012078011
Classification: Data Security Analyst
Our Fortune 500 Bay Area Client is seeking a Senior Security Analyst (III) who is responsible for assisting with day-to-day operations of the Enterprise Information Security (EIS) organization and to help introduce efficiencies that can streamline internal processes and procedures. The Information Security Analyst would possess the ability to automate appropriate functions which is critical for the team in order to scale and grow. Therefore, the ability to research, develop, and keep abreast of testing tools, techniques, and process improvements in support of security detection and analysis is key.
*This role is 100% Remote.*
**This is an FTE role, with Salary and Benefits.**
Specific responsibilities will include:
-Communicate unresolved information technology security exposures, misuse, or noncompliance situations with appropriate management.
-Respond in a timely manner to suspected loss or misuse of information technology assets.
-Participate in investigations of suspected information technology security misuse or in compliance reviews as requested by auditors.
-Document security architecture, infrastructure components, and operating procedures to help maintain and manage a service catalog.
-Provide users and management with technical support on matters related to information security such as the criteria to use when selecting information security products from the service catalog.
-Responsible for assisting with the designing, engineering and administering a full range of IT security systems, auditing all of the information and physical security (as it relates to information technology) solutions and overall IT security environment including endpoint, network, server and border security and VPN security.
-Ensure that secure practices, procedures and policies are designed and implemented, provide input into future state decisions regarding information security technology design.
-Monitor VPNs, server logs, firewall logs, intrusion detection/prevention logs, network traffic and other security systems for unusual or suspicious activity.
-Interpret activity and implement plans for resolution.
-Monitor current and proposed laws, regulations, industry standards, and ethical requirements related to information security and privacy.