Information Security Analyst

Summary:

The Sterlyn Group is looking for a sharp individual who has an in-depth understanding of information systems and information security who can evaluate those items and provide recommendations for improvement and be able to communicate that effectively via verbal and written skills. This company promotes an exciting and creative atmosphere for a team player who is self-motivated and thrives in a flexible self-managing environment.

Interested parties should contact:

Mark Clausman
eMail: mark@sterlyn-group.com
phone: (317) 439-0849

 

Description of Position:

Analyze information systems to identify mission critical systems and data, determine current level of security, risks and vulnerabilities. Make recommendations to increase security and remediate problems found. Create the customer deliverable which is the security assessment report that includes a risk analysis and description of problems, recommendations and remediation action plan.

Requirements:
-  Information Security work experience – minimum of 3 – 5 years
-  Certification in Information Security such as CISSP, CISA, CISM, etc.
-  Experience with the use of data analysis and security scanner tools
-  Understanding of network topology architecture
-  Understanding of security controls
-  Knowledge of operating systems and networking protocols
-  Good written, verbal and interpersonal communications skills
-  Ability to create concise comprehensible reports

Preferences

-  4 year degree in Information Systems Security or other computer technology/engineering degree
-  Consultative experience in the billable time environment
-  Project management skills
-  The ability to evaluate and create security policies, procedures and processes
-  Disaster Recovery/Business Continuity Plan development, Business Impact Analysis experience
-  Network/computer certifications such as CCNA, MCSE, CCDA, MCSA, etc.
-  Familiarity with industry standard information security guidelines such as NIST SP800, ISO 27002, COBIT, etc.
-  Familiarity with information security regulations such as HIPAA, GLBA, SOX, PL125, PCI, etc.