What are the responsibilities and job description for the ANALYST - INFORMATION SECURITY position at Hard Rock Hotel and Casino Atlantic City?
Job Description
Job Description
Overview
The Information Security Analyst performs two core functions for the enterprise. The first focuses on the day-to-day operations of the in-place security solutions while the second is the identification, investigation and resolution of security events detected by those systems. Additional tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines and procedures as well as conducting vulnerability assessments and coordinating the remediation of areas requiring attention.
Responsibilities
- Monitors threat intelligence sources for potential issues that may impact operations.
- Reviews logs and reports of security systems (end point protection, data loss prevention, firewalls, etc.) and other sources (workstations, servers, network devices, etc.). Interprets the implications of anomalous or suspicious activity and devises plans for appropriate action.
- Leverages vulnerability management platform to drive risk-based remediation of systems missing patches or requiring configuration changes. Participates in the evaluation of compensating controls, where appropriate.
- Conducts research on emerging products, services, protocols, and standards in support of security enhancement and development efforts.
- Supports internal and external assessments and audits
- Provides security consultation and guidance to peers in information technology with regards to in-place and developing technology solutions, processes, and procedures.
- Assists the Information Security Officer in coaching business unit partners on security awareness, policy compliance, and risk management.
- Supports the Information Security Officer in leading the response to information security incidents.
- Participates in the planning and design of enterprise security architecture, under the direction of the Information Security Officer, where appropriate.
- Participates in the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures) under the direction of the Information Security Officer, where appropriate.
- Participates in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, under the direction of the Information Security Officer, where appropriate.
Qualifications
Technical Requirements