Scottsdale, AZ, USA
19 hours ago
Security Admin Teir 1

The Information Security Administrator I will be responsible for the design, implementation, and support of technical, operational, and procedural measures to provide for the confidentiality, integrity, and availability of information based on business requirements and risk analysis. This position is part of the Global Security Operations team, which is responsible for sustaining a proactive security posture across the enterprise.

 

 

Primary Functions and Essential Responsibilities:

 

Administer and maintain up to five security tools and / or applications. Analyze successful and unsuccessful breaches of security controls, determine their root cause, and support remediation efforts. Responsible for day-to-day tickets, break fix. Assist / support escalation of verified security events / incidents from analyst(s) Create and maintain global security documents (e.g., procedures and guidelines to address identities, endpoints, data, applications, and infrastructure), and devise methods to measure their effectiveness. Provide periodic assistance to internal and external auditors (IA) (e.g., Provide control evidence and other requests in a timely manner. Participate in IA interviews, providing clarification of processes and technologies performing controls). Assist other team members with security tools, creation of reports and security issues resolution. Report unresolved network security exposures, misuse of resources, noncompliance. Manage and maintain external assets. Manage and review dark web datasets. Manage Microsoft security platform to include: Azure Conditional Access Policies Named locations. Privileged Roles Intune Microsoft Defender platforms Perform threat and vulnerability assessments. Provide remote access platform design, configuration, and support. Assist and train Carlisle members in becoming and remaining compliant with the company's Information Security Policies and Standards, including support of the creation and maintenance of security training content. Research and participate in the selection of innovative technologies that will protect against data loss. Assist in the configuration and deployment of such tools. Assist in the development of security awareness communications (Quarterly newsletters). Monitor phishing simulation platform. Stay current with modern technology and adapt it to improve the security posture. Provide guidance and mentorship to Cybersecurity Analysts.
Confirm your E-mail: Send Email