What are the responsibilities and job description for the Information Security Analyst position at innovitusa?
Strong ability to identify problems / issues, analyze and evaluate alternatives and recommend / implement effective solutions. -Required - 8Years
Experience providing Windows and Linux operating system and application support. -Required - 8Years
High level knowledge and experience of network facilities and data processing techniques, of computer hardware and software, of network operating system and security software, and of performance monitoring and capacity management tools -Required - 8Years
Orchestrate calls to include, but not limited to project kick-off calls, notification of high / critical findings during the testing process, and close out calls to review test findings, evidence, process steps to reproduce, and remediation recommendations. -Required -8Years
Ability to prepare concise written reports appropriate to the audience. Ability to communicate effectively verbally and in writing. -Required - 8Years
Responsible for implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers' methodologies, in order to anticipate breaches. -Required -8Years
Responsible for ensuring all networks have adequate security to prevent unauthorized access. Also must ensure that all security systems are current with any software or hardware changes in the company. -Required - 8Years
Perform proactive research to identify and understand new threats, vulnerabilities and exploits. Perform procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. -Required -8Years
Extensive experience with working with and implementing NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms, and developing Corrective Action Plans. -Required - 8Years
Review violations of computer security procedures and discuss procedures with HHSC / TIERS Security team. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. -Required - 8Years
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution.
Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right.
Surveys & Data Sets
What is the career path for a Information Security Analyst?
Sign up to receive alerts about other jobs on the Information Security Analyst career path by checking the boxes next to the positions that interest you.