Recent Searches

You haven't searched anything yet.

2 Jobs in Portland, OR

SET JOB ALERT
Details...
BizTek People, Inc. | APA International Placement Consultants
Portland, OR | Full Time
$86k-104k (estimate)
6 Months Ago
CareOregon
Portland, OR | Full Time
$77k-94k (estimate)
1 Month Ago
Information Security Analyst
$86k-104k (estimate)
Full Time 6 Months Ago
Save

BizTek People, Inc. | APA International Placement Consultants is Hiring an Information Security Analyst Near Portland, OR

POSITION SUMMARY: The Information Security Analyst will work on all aspects ofinformation security . The position is responsible for securinginformation in all its forms and reducing risk as it relates to data,facilities, and personnel through the deployment and operation of securitytools and processes. This includes architecture, change management,endpoint and server security, policy, operations, development, training, andincident response. This position is a senior technical escalation resource andliaison for client support teams dealing with endpoint, server, networking, andsecurity issues.

ESSENTIAL DUTIES AND RESPONSIBILITIES:

  1. Acts as a contact for escalations from corporate IT ticketing system client support for security-related issues and leads problem resolution.
  2. Leads the deployment and support of existing client programs where there is a security nexus.
  3. Provides expertise for Governance, Compliance and Risk standards and control families.
  4. Ensures that security architectural and hardware changes do not introduce risk or adversely impact network and client support operations.
  5. Collaborates across the IT organization to ensure the needs of relevant stakeholders are addressed and participates in organization-wide projects.
  6. Monitors advanced security reporting and data loss prevention (DLP) tools and platforms. Analyzes logs and collected data to detect and prevent possible breaches. Prepare reports as needed on security incidents; develop, lead, and implement remediation responses.
  7. Assists in maintenance of the physical security and badging systems at local and remote locations.
  8. Conducts vulnerability testing to detect problems with networks and systems. Reports results to operations teams and advises on the remediation and possible impact.
  9. Serves on the Incident Response team to quickly identify, contain, analyze, remediate, and document security incidents.
  10. Remote support and on-call hours may be required on a rotational basis.
  11. Continuously improve information and cybersecurity at through research, testing, and implementation of new technologies, tools, and improvements to existing tools, processes, or designs; makes recommendations to the Information Security Manager.
  12. Performs other duties as assigned.

CORE COMPETENCIES: To perform the job successfully, the individualshould demonstrate competencies in performing the essential functions of thisposition by performing satisfactorily in each of these competencies. 

  • Problem solving: Identifies and resolves a diverse range of moderately complex problems in a timely manner, gathers and reviews information appropriately. Exercises judgment within company policies and practices; seeks input from other team members as appropriate for complex or sensitive situations.
  • Oral/written communication: Listens carefully and speaks clearly and professionally in all situations. Edits work for accuracy and clarity, Is able to create, read and interpret complex written information. Ability to build productive relationships with senior internal and external personnel in own area of expertise.
  • Planning/organizing: Prioritizes and plans work activities, organizes personal and project timelines and deadlines, tracks project timelines and deadlines, and uses time efficiently.
  • Adaptability: Adapts to changes in the work environment, manages competing demands and is able to deal with frequent interruptions, changes, delays, or unexpected events. Ability to quickly integrate new tools and processes
  • Dependability: Consistently on time and at work, responds to management expectations and solicits feedback to improve performance.
  • Team Building: Capable of developing strong interpersonal networks and trust within the organization. Leads consensus by involving all stakeholders, facilitating their understanding of differences, agreeing on requirements and constraints, and developing the best solution.
  • Safety Culture: Adheres to the Safety culture and is expected to model safe behavior and influence peers to meet high standards.
  • Quality Assurance: Demonstrates understanding and implementation of quality assurance regulations, standards and guidelines of 10 CFR 50 Appendix B, 10 CFR 21, and NQA-1.

Requirements

  • Education: A minimum of a B.S. degree in Computer Science or other technical degree from a four year accredited college/university is required. Alternatively, an additional 4 years related experience above the minimum years of experience (12 years total) may be considered in lieu of degree. A CISSP or GSE certification counts as three years of experience. A security related certification (CISSP, GSE, DoDD 8570, or similar) or enrollment an advanced degree program with a Cybersecurity and Information Assurance focus is preferred for this position. Must be able to receive a CISSP certification or equivalent within 18 months of employment.
  • Experience: A minimum of 8 years’ experience in complex IT environments. This includes direct experience facilitating company-wide security strategy and policy. Direct experience facilitating design, implementation and auditing of security controls to meet company strategy. A good understanding of applicable security, regulatory and audit frameworks. Must have familiarity working in a highly regulated industry and blending those into a startup company’s culture.
  • The position requires very strong knowledge in the following areas as it relates to implementing, supporting, and troubleshooting security incidents;
  • Microsoft and Linux client and server operating systems/networking
  • Encryption technologies and implementations
  • Network architecture and management including switches, servers, firewalls, protocols, and sniffers
  • Security tools and processes (scanning, pen testing tools, forensic tools, risk assessment, etc.)
  • Strong understating of Insider Threat prevention and social engineering attacks
  • Sensitive data exfiltration prevention
  • Background using Compliance Software such as AuditBoard, MS Compliance Manager, etc.
  • Cybersecurity policies and user policy compliance tracking and measurement
  • Knowledge of MS Exchange and other network mail systems and associated email risks.
  • Blended attacks and advanced persistent threats
  • Understanding of normal and abnormal ingress and egress network traffic
  • Exposing techniques used by malicious actors to hide malware and command and control traffic
  • Understanding of public key infrastructure
  • End point configuration management
  • Strong ability to do network and end point forensics including live RAM and disk systems
  • Scripting or programming (example: Powershell, Bash, BAT, VB Script, C#, ASP.Net, etc.)
  • Preferred skills and background in the following areas:
  • Evidence collection for governance and compliance standards such as NIST 800-53, 800-171 and ISO/IEC 27001:2013
  • Overlap discovery and identification of complimenting compliance standards based controls
  • Tenable Nessus Vulnerability Scanning and Identification platform
  • Certifications or compatible coursework compatible with Cloud , Security , A CompTIA certifications
  • SEC501: Advanced Security Essentials - Enterprise Defender (GCED)
  • SEC503: Intrusion Detection In-Depth (GCIA)
  • SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling (GCIH)
  • SEC560: Network Penetration Testing and Ethical Hacking (GPEN)
  • Industry Requirements: Eligible to work under Department of Energy 10 CFR Part 810. Needs to have a strong understanding of information and cyber security as it relates to a R&D company in a heavily regulated space.

Job Summary

JOB TYPE

Full Time

SALARY

$86k-104k (estimate)

POST DATE

11/21/2023

EXPIRATION DATE

06/19/2024

Show more

The job skills required for Information Security Analyst include Information Security, Cybersecurity, Incident Response, Computer Science, Security Controls, CISSP, etc. Having related job skills and expertise will give you an advantage when applying to be an Information Security Analyst. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Information Security Analyst. Select any job title you are interested in and start to search job requirements.

For the skill of  Information Security
Linn-Benton Community College
Full Time
$270k-378k (estimate)
3 Weeks Ago
For the skill of  Cybersecurity
BizTek People, Inc. | APA International Placement Consultants
Full Time
$86k-104k (estimate)
6 Months Ago
For the skill of  Incident Response
CITY OF BEAVERTON
Full Time
$92k-111k (estimate)
1 Week Ago
Show more

The following is the career advancement route for Information Security Analyst positions, which can be used as a reference in future career path planning. As an Information Security Analyst, it can be promoted into senior positions as a Systems/Application Security Analyst, Sr. that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Information Security Analyst. You can explore the career advancement for an Information Security Analyst below and select your interested title to get hiring information.

CareOregon
Full Time
$77k-94k (estimate)
1 Month Ago