AL, US
258 days ago
Cyber Security Analyst II or III
Welcome page Login Cyber Security Analyst II or III Job Locations US-MS | US-AL | US-TN Posted Date 8 months ago(1/16/2024 5:06 PM) Job ID 2024-10633 # of Openings 1 Category Technology Overview

Cyber Security Analysts perform a variety of complex administrative, technical, advisory, and project management work in the Office of Cyber Security ensuring overall systems security in our private and commercial cloud services. They design and implement security controls to protect C Spire assets from cyber-attacks. They also help develop organization wide best practices for cyber security, monitor for security issues, and document security issues identified.


This role supports our governance, risk, and compliance efforts by performing cyber security control reviews or security audits and performing technical security assessments (e.g., vulnerability analysis, penetration testing, and application testing).

Responsibilities

“Customer Inspired” isn’t our slogan — it’s our driving force, and not everybody is built for it. While we all bring our own strengths and skillsets to the table, there are some traits every C Spire Team Member needs to have:

A relentless obsession to be the best in our industryA winner mentality determined to outsmart and outdo competitorsA single-minded commitment to unbeatable customer experiencesAn unapologetic passion for innovation and technologyAn uncompromising drive toward continuous improvementA steadfast devotion to doing the right thing the right wayA deep-seated dedication to accountability and ownership

Job Specific Responsibilities:

Perform security risk and compliance assessments in accordance with relevant industry frameworks (e.g., NIST 800-53, NIST CSF) and compliance requirements (e.g., SOC 1/2, PCI-DSS, HIPAA, etc.).Track, report, and provide dashboard visibility on risk based, SOC, and PCI remediation initiatives.Analyze potential risk scenarios and facilitate corrective action plans to ensure controls effectiveness for mitigating exposure to identified risks.Communicate security compliance issues and control gaps through security governance and audit control processes.Recommend and monitor cyber security and IT security controls for systems and data across the enterprise.Participate in the development and maintenance of audit and remediation plans for critical environments, applications, and systems.Provide compliance, risk, and controls expertise to support various cyber security and compliance initiatives and activities.Coordinate and interact with external auditors, IT administrators, developers, and business executives.Consult with and advise business executives and IT administrators on various operational issues related to cyber security.Track audit findings to ensure corrective actions are implemented.Analyze and assess damage to infrastructure resulting from security incidents, examine available tools and processes for remediation.Assist with developing and implementing cyber security program which includes cyber security policies, risk assessments, security awareness training, etc. Qualifications

The following are preferred qualifications for both the level II and level III Cyber Security Analyst:

System administration (preferably at enterprise scale).System hardening / secure configuration baseline development.Vulnerability scanning / management.Virtualization (e.g., VMware, containers).Application security (e.g., WAFs, API security, code reviews, DAST/SAST/IAST, etc.).Attack surface management.Cloud architecture and security.Scripting (e.g., Python, PowerShell).

 

REQUIRED

Level IIBachelor’s degree in Information Systems, Computer Science, or Business with an emphasis in Information Technology or related field.3-5 years of professional IT experience required.2+ years of professional Cyber Security experience.Cyber security certification (e.g., Security+, CySA+, CRISC, GWEB) or ability to achieve within a year.Working knowledge of operating systems (e.g., Microsoft Windows, Linux).Basic understanding of application security (e.g., OWASP Top 10).Basic proficiency with cyber security controls, security compliance analysis, security risk assessment, cyber security controls assessment, and security control gap analysis.Knowledge of cyber security concepts, assessment processes, and high-level controls used for validating compliance. Understanding of major GRC security regulations/assessment processes (NIST 800-53, NIST 800-37, ISO 27001, SOC 1/2, and related primary security regulations) would be extremely useful.Strong critical thinking and problem-solving skills.Excellent written and oral communication skills, including the ability to communicate complex technical issues to senior stakeholders and non-technical staff.Prior experience working in an IT organization, supporting enterprise level IT functions and processesLevel IIIAll of the required qualifications for a Level II.5+ years of professional IT experience required.3+ years of professional Cyber Security experience.Solid understanding of application security (e.g., OWASP Top 10, web application firewalls).Proficiency with cyber security controls, security compliance analysis, security risk assessment, cyber security controls assessment, and security control gap analysis.Strong knowledge of cyber security concepts, assessment processes, and high-level controls used for validating compliance. Understanding of major GRC security regulations/assessment processes (NIST 800-53, NIST 800-37, ISO 27001, SOC 1/2, and related primary security regulations). Options Apply for this job onlineApplyShareEmail this job to a friendRefer Sorry the Share function is not working properly at this moment. Please refresh the page and try again later. Share on your newsfeed Connect With Us! Not ready to apply? Connect with us for general consideration.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, sexual orientation, gender identity, pregnancy or national origin. On request, reasonable accommodations will be made for qualified individuals with disabilities. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of disability. Application FAQs

Software Powered by iCIMS
www.icims.com

Confirm your E-mail: Send Email