Security Analyst -IT Security Operations - TN

Depends on Experience

Full Time

  • No Travel Required

Skills

CISACISMCISSPCloud securityData analysisElectronic discoveryGIACIT securityIncident managementInformation security

Job Description

Title: Security Analyst -IT Security Operations 

Location: Multiple locations
Industry: Paper / Packaging / Containers 
Job Category: Information Technology - Computer Network Security

Knowledge and Experience:

  • Bachelor’s Degree in Information Technology, Information Security/Assurance,     Computer Science,Engineering, or related field of study, or any combination of relevant equivalent experience,education and training.
    •7+ years of overall IT work experience
    •4+ years in an Information Security Role.
    •Proven leadership skills with the ability to manage conflict, deal with ambiguity, negotiate and
    make timely decisions
    •An advanced understanding and practical application experience in threat detection and response
    as well as Vulnerability Management and security related technologies and services is a must
    •Understanding of a variety of technical concepts such as: Networking, systems administration,
    application development, cloud computing and information security best practices
    •Experience with data analytics with the ability to provide qualitative analysis and
    recommendations
    •Ability to assess and communicate risk within a business context
    •Strong attention to detail, data accuracy, and data analysis
    •Self-motivated and operates with a high sense of urgency and a high level of integrity
    •The ability to learn and apply new concepts quickly
    •Comfortable with interfacing with other internal or external organizations regarding security
    policy and standards violations, security controls failure and incident response situations
    •Excellent verbal and written communication skills with demonstrated ability to write clear,
    concise business communication for multiple levels (management, technical, and user).
    •Security Certification preferred: CISSP, CISM, GIAC or CISA or similar
    Scope
    •Interface with Managed Service providers
    •Interface with multiple areas within the organization
    •Vendor Management and oversight (SLAs, Metrics)