|Reference # :||19-03112||Title :||Information Security Analyst|
|Location :||Mount Laurel, NJ|
|Position Type :||Full Time/Contract|
|Experience Level :||Start Date / End Date :||04/08/2019 / 10/07/2019|
|Information Security Analyst|
Duration: 6 month contract +, strong potential for hire perm
Location: Mount Laurel, NJ
# of openings: 2
Reason for request: Cyber Security Issue Management
Selling Points of Position: Exposure to large & new Cyber Risk management program. Assist with cyber security issue management functions
Best Vs Average Candidate: Able to lead discussion and work independently, Other Financial institutions experience, Excellent communication (written and verbal) & organization skills. Proficient in Microsoft office suite.
How will performance be measured: based on deliverables
1.) IT Audit ( in-depth) knowledge in DB , servers and network infrastructure ) 5yrs*
2.) Information Security 3yrs
3.) General knowledge of IT security and Risk disciplines and practices 3yrs*
5.) Working knowledge of industry frameworks such as the ISO 27002, NIST Cyber Security Framework * 2 yrs
6.) Strong leadership and communication skills
7.) Deep knowledge of MS Office products (e.g. Excel)
8.) Strong telephone skills (Facilitating over the phone ) 3yrs*
NICE TO HAVE
1.) CISSP and/or CISM accreditation
2.) Supplier Risk Management experience
3.) Any other technical certification ( please detail in comment section )
? Excellent client engagement/management skills
? Possesses exceptional strategic thinking, planning and relationship skills
? Ability to influence management and build credibility across the organization
? Conduct calls with Third Party Subject Matter Experts to determine if technical evidence presented successfully closes cyber technical control gaps.
? Extract data from Sharepoint lists and develop excel pivot tables to help analyze and follow up on near due cyber control gap issues.
? Attend project intake calls to determine if cyber control assessments are required.
? Analyze email evidence presented to determine if controls are sufficient to close cyber control gaps.
? Assist the assessors with our GRC tool to input and manage cyber control gap findings.