Our client, is seeking a Sr Security Analyst for a Direct Hire role. This role will primarily be responsible for designing security solutions and advancing the security program oversight capabilities of the Bank. The successful candidate will assist in furthering the maturity of the security program to address emerging security risks. Candidates should have five or more years of related work experience.
Leads and provides technical consultation, in collaboration with Security Operations, on information security architecture and design requirements
Leads and participates on project working teams and ensures security standards are designed and implemented appropriately on new capabilities and technology
Uses software tools and technology to manage security posture
Monitors and manages compliance with security standards
Identifies security incidents across all technology platforms and manages incident response process, including lessons learned
Performs third-party vendor security risk reviews, including analysis of vendor responses and reports (e.g., SOC 1, SOC 2 and ISO 27001)
Assists with third-party security threat and vulnerability assessment activities and serves as a lead architect of third-party security monitoring services and associated tools/portals
Participates in the development of security policies and procedures and monitors compliance to ensure safe and sound business operations
Maintains knowledge of new security threats, vulnerabilities and industry solutions, as well as security technology trends and advances
Five or more years of experience in information security or a combination of information security and IT/IS Audit or related discipline
Strong working knowledge of information security best practices, technology control frameworks (e.g., NIST CSF and COBIT) and information security risk management standards
Knowledge of vendor security risk management practices (e.g., SIG Questionnaire, SSAE18)
Knowledge of information technology service management processes and related control activities in the areas of change management, computer operations, database administration, information security administration, network security, operating system security and web application security
Knowledge of current tools/practices for developing and publishing policies, procedures, metrics and other information
Knowledge of security design in cloud and mobile architectures
Knowledge of vulnerability management and configuration management toolsets (e.g., Qualys)
Knowledge of security event monitoring and data access governance tools (e.g., Log Rhythm, StealthBits)
Bachelor’s degree in information systems or related field or an equivalent combination of education and work experience
The most pressing issue for businesses today is the quest for growth, and more than innovation, operations or even customer relationships, CEOs are looking for talent and leadership to secure and sustain it. People are truly an organization’s greatest asset.
With an active nationwide database of more than 500,000 seasoned professionals, A.C.Coy employs the latest tools to manage effective recruiting. The technology helps to quickly identify and contact the right candidates with the skills and experience clients need.
The tools that A.C.Coy uses provide a unique perspective regarding culture, performance, leadership, and team "fit". And our integration methodology ensures that new leaders are integrated quickly and successfully without breaking stride.