Security Business Analyst Financial & Banking - Quincy, MA at Geebo

Security Business Analyst

Position:
Security Business AnalystLocation:
Greater Boston area, MA Hybrid (Onsite 2-3 days/week)Job Type:
ContractDuration:
4 months to startJob DescriptionThe Security Business Analyst will work collaboratively with the CISO, and department heads within the Security Office to identify, analyze and document operational processes, procedures and workflows.
In addition, the Security Business Analyst will be responsible for determining operational objectives by studying Security Office functions, gathering information; evaluating output requirements and formats.
The incumbent must be able to identify emerging information security threats, potential audit findings and potential incidents, and to work in conjunction with internal and external stakeholders on solutions and risk mitigation strategies.
The individual will produce detailed documentation, including procedures, processes, and data flows to improve the security posture of the organization and will provide recommendations for security enhancements to existing operational processes and procedures.
DETAILED LIST OF JOB DUTIES AND
Responsibilities:
Research data management best practices, including in the areas of governance, storage, privacy, and reporting.
Review current policies and procedures and make recommendations for policy and process changes to address gaps and risks associated with current IT Security operations.
Work with stakeholders, vendors, contractors and applicable third parties to ensure existing Policy and Standards are up to date.
Create knowledge resources and materials related to IT Security.
Develop documentation, such as, workflows, guidelines, processes, and procedures, regarding Incident Response Plan, Vulnerability Management Program and other security initiatives.
Develop a process for tracking open security-related problem reports and fixes.
Help institute clear operational protocols and advise on the deployment and/or acquisition of IT assets, ensuring that IT Security is well-supported with the tools and information needed to effectively implement Security functions.
Prepare, manage, and communicate project plans.
Coordinate project activities with team participants as required.
Ensure project documentation, plans and scheduling are in compliance with agency initiatives and priorities.
Identify risks, potential scope creeps & escalating issues to Security Office management.
Maintain a comprehensive understanding of the evolving threats to networks, applications and cloud infrastructure.
Adjust to changing situations to meet emergencies or security incident resolution.
Prepare program documentation:
flow charts, file layouts, input/output documentation and program narratives.
QUALIFICATIONS TO BE SUCCESSFUL Bachelor s degree Five years relevant experience Excellent process design and procedural writing skills.
Strong verbal communication skills.
Strone interpersonal and organizational skills.
Proficient in Microsoft Office, i.
e.
, Access, Excel, PowerPoint, Word, and VISIO.
Demonstrated ability to work independently, as well as within project teams, providing relevant system analysis services.
Highly analytical, with the ability to independently analyze, document findings and recommend solutions.
Security certification a plus.
Prior Government or healthcare experience a plus.
Talent Groups is an equal opportunity employer.
Our goal is to promote an environment that helps our employees and clients appreciate the benefits that diversity provides.
Recommended Skills Auditing Communication Computer Security Coordinating Data Management Governance Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3r7g46l87hkcby18f5', 'ExternalApply-j3r7g46l87hkcby18f5'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.