Overview
Skills
Job Details
Position: Security Analyst II - Compliance
Position Type: Direct Hire
Compensation: $80,000 - $120,000
Location: Tulsa, OK
Job Summary:
Archon Resources is currently looking for a Security Analyst focused on Security Compliance to join one of our clients located in Tulsa, OK. This is an FTE/direct hire position. The ideal candidate will ensure the organization's information systems comply with legal and company policies, preventing security breaches and maintaining data integrity. The analyst will implement and monitor security measures, develop procedures, supports internal and external audits, analyze audit results, coordinate remediation efforts, monitor SEC filings, and support its cybersecurity and physical security compliance programs. This includes compliance with relevant security standards, regulations, and internal policies.
Support services provided by the Security Compliance team include audit and inspection support, compliance tracking and communications, control framework development and maintenance, critical facility assessment, legal holds and forensic collections, security governance document management, and SOX compliance. Additionally, the analyst educates colleagues on security compliance.
Job Profile Summary
Responsible for consistent execution and application of security functions within the overall information strategy, management system processes, programs, communications, and activities within the organization. Relies on established procedures and playbooks to perform structured work assignments and leverages own general knowledge to navigate proper course of action when the situation at hand appears to deviate significantly from expected situations.
Essential Functions and Responsibilities
- Consistently executes and operates functions within the information security framework to help maintain confidentiality, integrity, availability, and safety of assets by protecting against unauthorized use, disclosure, modification, or loss. Relies on established procedures and playbooks to perform structured work assignments and leverages own general knowledge to navigate proper course of action when the situation at hand appears to deviate significantly from expected situations.
- Performs configuration and light scripting/programming of security systems to implement, automate, and operate security processes. Relies primarily on detailed specifications and instructions in performing configuration and programming and leverages own knowledge to navigate proper course of action when situation at hand appears to deviate from or conflict with those instructions.
- Operates and executes processes to control risk through existing playbooks, guidance, policies, and procedures to minimize exposure in accordance with applicable laws and regulations. Relies on established procedures and playbooks to perform structured work assignments and leverages own general knowledge to navigate proper course of action when the situation at hand appears to deviate significantly from expected situations.
- Operates and executes processes to identify risks to the security of assets and facilities. Relies on established procedures and playbooks to perform structured work assignments and leverages own general knowledge to navigate proper course of action when the situation at hand appears to deviate significantly from expected situations.
- Collaborate with appropriate personnel to refine and improve processes to validate and monitor compliance with internal security policies and applicable laws and regulations.
- Responsible for consistent execution of tasks in support of risk assessment programs. Relies on established procedures and playbooks to perform structured work assignments and leverages own general knowledge to navigate proper course of action when the situation at hand appears to deviate significantly from expected situations.
- Respond to security incidents in accordance with guidance from security leadership, playbooks, and processes. Relies on established procedures and playbooks to perform structured work assignments and leverages own general knowledge to navigate proper course of action when the situation at hand appears to deviate significantly from expected situations. Promptly reports and appropriately escalates security incidents based on existing guidance and processes.
- Responsible for consistent execution of tasks in support of identity and access management programs. Relies on established procedures and playbooks to perform structured work assignments and leverages own general knowledge to navigate proper course of action when the situation at hand appears to deviate significantly from expected situations.
- Assists as directed by security leadership in the production and development of security awareness, training, and educational activities.
- Assists as directed by security leadership in developing, applying, and monitoring the secure configuration of devices in the environment.
Education
Bachelor's Degree in information technology, accounting, other related field, or an equivalent combination of formal education and the following job related experience.
Work Experience
- Experience in security or experience in a directly-foundational role providing necessary background to learn security functions.
- Experience operating within a defined framework of procedures and playbooks.
- Experience interacting, advising, and communicating effectively
Knowledge, Skills and Abilities
- Knowledge of: IT infrastructure environments, local and wide-area networks and application security needs.
- Ability to: manage small to medium information security projects.
- Ability to: develop consensus and facilitate decision-making among senior executives.
- Ability to: communicate and/or exchange information; conduct oral presentations.
Licenses and Certifications
- Certified Secure Software Lifecycle Professional (CSSLP) preferred.
- Certified Information Privacy Professional (CIPP) preferred.