Senior Information Security Analyst Information Technology (IT) - Charlotte, NC at Geebo

Senior Information Security Analyst

Outstanding contract opportunity! A well-known Financial Services Company is looking for a Senior Information Security Analyst in Charlotte NC, Dallas TX, or Chandler AZ (Hybrid).
Work with the brightest minds at one of the largest financial institutions in the world.
This is long-term contract opportunity that includes a competitive benefit package! Our client has been around for over 150 years and is continuously innovating in today's digital age.
If you want to work for a company that is not only a household name, but also truly cares about satisfying customers' financial needs and helping people succeed financially, apply today.
Contract Duration:
9 Months Required Skills & Experience 4
years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following:
work experience, training, military experience, education.
Excellent communication (oral and written) with ability to communicate and influence executives, senior leaders, LOB stakeholders, product owners, technology, business analysts, and other internal partner.
Experience in Third Party Risk Assessment and Remediation Desired Skills & Experience Cybersecurity experience Risk & Compliance experience Stakeholder Relations experience Experience with TruSight Best Practice Questionnaire Ability to prioritize work, meet deadlines, achieve goals, and work under pressure in a dynamic and complex environment.
Strong time management skills including the ability to handle multiple deliverables concurrent.
Finance sector security experience or other highly regulated industries Subject matter expertise in one or more cybersecurity control domains such as encryption, logical access management, cloud computing, threat, and vulnerability management, and/or network management What You Will Be Doing Provide information security consultation to improve awareness and compliance with Enterprise Information Security policy, processes and standards.
Perform remediation of security assessment review issues, complex ad hoc data, and reporting to support information security risk management.
Provide guidance and direction in reviewing assessment findings and mitigating controls to optimize information security.
Identify and direct information asset portfolio reconciliations and certifications.
Provide advanced data aggregation and data of information security risk exposure.
Develop and deliver Information Security Education Awareness and Training in accordance with the Enterprise Information Security Program standards.
Review draft and proposed control standards for business impact and recommend modifications or clarifications as required.
Conduct security control testing and consultation with stakeholders.
Evaluate and interpret internal and Enterprise Information Security policies, processes, and standards, and provide recommendations to improve them.
Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals.
Interact with internal customers.
Serve as a mentor to less experienced staff.
Will be working with other Information Security Analysts, Managers and Third-Party Representatives Responsible for following documented procedures to review risk treatment requirements, direct remediation and escalate to accountable executives as needed.
Directly support findings management and the remediation of findings when a Technology Dynamic Evaluation (TDE) results in technology or security finding(s Recommended Skills Cloud Computing Cryptography Finance Network Administration Risk Management Stress Management Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.