Job Description :
Job Title:   IT Security Analyst
Location:   Urbandale, Iowa
Shift:          1st Shift
Contract:   36 Months

JOB DESCRIPTION 

Responsible for the processes of granting and maintaining security for applications, networks and data throughout the organization or unit specified. Develops and refines security processes, standards, and definitions with minimal supervision. Takes an active role in understanding security risks and in investigating, deploying, and supporting tools and processes to reduce the risk. Serves as security consultant with business owners. Primarily performs as an individual contributor, but may supervise a small work team (6 or fewer members). Understands and applies current Information Technology (IT) security policies and provides input to new policies to ensure adherence to standards established by Corporate Computer security. Takes an active role in identifying security risks and in investigating, deploying, and supporting new tools and procedures to minimize that risk. Uses analytical skills to resolve medium to high security issues. Monitors the quality of the process and actively looks for ways to improve the process. Provides input into many decisions concerning tools and processes. Makes decisions for requests that fall outside of normal processes that affect their Unit or Division. Works on tasks and projects that are medium to high risk and of moderate to high complexity in nature where errors could affect an entire Unit or Division. Duties: Serves as a coordinator of the daily activities regarding overall maintenance of RACF, Network, User-ID, user groups, etc. to assure security integrity. Understands and applies current Information Technology (IT) security polices and provides input to new policies to ensure adherence to standards established by Corporate Computer security. Takes an active role in identifying security risks and in investigating, deploying, and supporting new tools and procedures to minimize that risk. Uses analytical skills to resolve medium to high security issues. Works on teams for providing tools, techniques and procedures used by Security employees in the role of Security Analyst I and Security Analyst II. Participates fully as an effective team member and is capable of performing any role on the team including some leadership as required. Participates on multiple teams. Assumes some responsibility for own teaming ability as well as strengthening the ability of others. Takes part in projects involving existing and new processes and tools that affect their Division or Unit. Monitors the quality of the process and actively looks for ways to improve the process.

* Provides input into many decisions concerning tools and processes. Makes
decisions for requests that fall outside of normal processes that affect
their Unit or Division.
* Works on tasks and projects that are medium to high risk and of moderate to
high complexity in nature where errors could affect an entire Unit or
Division.
 
*Specific Position Requirements*
This person would need to sit locally. Would work remote primarily, but would need to be onsite approximately once per week.

Enables Business IT Security Integration Capabilities
---Provides Tier 3 Support (White glove hardware/software service at first)
---Enables User Identity and Access Mgmt
---Enables transition to self-service long-term

Leverages IT Security Foundational Best Practices to identify and reduce/eliminate risk.
Executes Risk Assessments and partners on threat models
Executes Risk Treatment plan / Security Roadmap
Deploy Tools, Creates sustainability
Back-up for INC response and post-INC recovery/retro activities

Skills you need:
• Background in networking, infrastructure, general cloud exposure and experience with security concepts
• Demonstrated ability to learn new technologies
• Strong Analytical, communication and intrapersonal skills
• Tactical IT Support/ServiceDesk troubleshooting skills

Skills that would make you stand-out:
• Exposure to one or more programming languages and software development processes (CI/CD)
• Background in Linux salt configurations
• Experience in ServiceNow, SPLUNK, AWS, AZURE, GCP concepts and tools
• Knowledge of security concepts: vulnerabilities, ethical hacking, secure design practices, penetration testing
 
First Name /Middle Name /Last Name (as it appears on your Driver's License)
Birth Month /Date:
SSN (Last 3 Digits):
(If you are not Comfortable sharing the last 3 Digits of SSN, you can share any 3 random numbers. But please make a note of it)
Current Location:
             

Similar Jobs you may be interested in ..