·Works with the Chief Infrastructure Architect to determine acceptable level of risk for enterprise computing platforms.
·Responsible for and implementing enterprise information security procedures that promote corporate standards.
·Reviews information security controls to help provide effective, efficient and secure access to information within these applications.
·Works with other IT groups to ensure that all applications and platforms are functional and secure.
·Clearly communicates information security and technology issues to staff, formally and informally.
·Identifies and evaluates business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement.
·Member the Security Response Team (SRT) which identifies, reports, and resolves security violations.
·Facilitates use of technology-based tools or methodologies to review, design and/or implement security and risk processes.
·Continues education on new and emerging technologies in order to identify opportunities to improve IT environment.
·Complies with policies, procedures, and standards defined by the IT department and company.
·An IT Security Analyst will be able to perform the job duties of an IT Security Specialist.
· Four-year degree in Computer Science/Business or Network certifications, or equivalent experience.
· One to three years related experience in IT server and network administration or programming.
· Experience with Sarbanes-Oxley, Cobit and/or COSO, PCI and other regulatory requirements preferred.
· Knowledge of specific requirements regarding security as it applies to data, interfaces, and integration.
·Understanding of business processes, internal control risk management, IT controls and related standards
·Shows initiative and can work with minimum direction.
·Skills and abilities to provide business, technical and administrative guidance for activities in defined scope of responsibilities.
·Excellent written and verbal communication skills.
·Interpersonal skills to interact effectively with end-users, peers, managers, and vendors.
8 days ago