[Close] 

IT Security Analyst

6+ month Security Analyst needed ASAP in Chelmsford, MA! NO THIRD PARTY CANDIDATES WILL BE CONSIDERED Job Purpose:This position will lead IT Security and Compliance operations to meet data security and compliance requirements for the entire organization. This role will support the IT department by implementing security controls and processes that follow best practices to ensure adherence to regulatory requirements, specifically PCI Level 1, SOC 2, and client contracts.Key ResponsibilitiesEnsure operation of related compliance monitoring and improvement activities to meet compliance both with internal security policies?and applicable laws, regulations, and standards.Operationalizes IT security standards, best practices, architecture, and systems to ensure information system security across the enterprise.Prepare and document standard operating procedures and protocols.Responsible for addressing remediation efforts resulting from audits, vulnerability scans/pen tests.Deploy, maintain, and manage security infrastructure devices, products, and services, such as web filtering, log management, data encryption, anti-virus, patching, file integrity monitoring, IDS, vulnerability scanning, penetration testing, and MSS Security Operations Center.Participates in investigations into problematic activity.Supports and ensures compliance as it relates to IT security and risk with:Contractual agreementsClient agreementsPCI Level 1 and SOC 2Corporate policies, standards and procedures (CLEAR)Leads response and documentation of Security alerts and incidents (HIDs/NIDs/AV/Rogue WAP).Leads the Change Management, Incident Management, and Vulnerability Management processes for the IT organization.Participates with the relationship with security vendors and partners.Supports and ensures the success of audit efforts related to Information Security.Participates with the life cycle of IT security policies and procedures.Works with policy and procedure owners to ensure they create, validate, communicate and store information consistently.Participates in the standardization of processes, designs and methodologies.Job ProfileRequired Skills and Knowledge?(Brief description of technical knowledge or skills needed to perform the job)Specialized broad, in-depth technical knowledge of security principles, processes, and data systems architecture are required.Experience as a systems or security engineer, preferably in a data and call center.Required Competencies?(Critical behaviors necessary to successfully perform the job)Understanding of common information and security architecture frameworks.Strong analytical skills; excellent oral and written communication skills; excellent problem-solving skills; ability to think strategically and act tactically.Ability to understand complex technical details and to communicate the most salient points to upper management is essential.Ability to manage small group meetings with members both within and outside of the IT organization.Strong communication and documentation skills required: must be able to incorporate the best ideas from the team, as well as drive acceptance of his/her own architectural and technical concepts.Proactively initiates key relationships to collaborate and pool resources with internal and external partners.Possesses the relationship skills necessary to work effectively in a large corporate environment.Gathers relevant facts and information to effectively solve problems.Understands big picture and creates effective solutions through understanding cause and effect.Knowledge of project management methodologies and techniques.?Required Qualifications?(Brief description of the educational background needed to perform the job)Bachelor?s degree in a technical field related field or additional related experience is preferred?Desired Skills:Security infrastructure device/application administrationConduct vulnerability scansVendor managementProject management - provided by Dice
security, compliance, IDS, IPS, vulnerability scanning, penetration testing, SOC, security operations, web filtering, log management, data encryptioni


Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

IT Security Analyst
Cambridge, MA Hollister Staffing
Principal IT Security Analyst
Hingham, MA The Talbots Inc
IT Information Security Analyst Undergraduate ...
Boston, MA Santander Bank
IT Security Architect II
Boston, MA The Boston Consulting Group
Security Analyst
Plymouth, MA Rockland Trust