Deprecated: strlen(): Passing null to parameter #1 ($string) of type string is deprecated in /home/jobstinger/public_html/job_site_info.php on line 213

Deprecated: strlen(): Passing null to parameter #1 ($string) of type string is deprecated in /home/jobstinger/public_html/job_site_info.php on line 221
Senior Network Security Analyst : 2024-06-24
  • Find preferred job with Jobstinger
  • ID
    #51968878
  • Salary
    USD TBD TBD
  • Source
    The Sherwin-Williams Company
  • Date
    2024-06-24
  • Deadline
    2024-08-23
 
Full-time

The Network Security Senior Analyst will contribute to the maintaining and monitoring of data flows and threats both in and out of the company's network infrastructure. The Senior Analyst will also build relationships with both Business Units and Peers within IT and Cybersecurity and act as a mentor to junior members of the team. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments. The Network Security Senior Analyst is expected to be fully aware of the enterprise's security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals. As a senior security analyst, the expectation is to support leadership with driving vision and strategy.

Strategy & Planning

Participate in the planning and design of enterprise security architecture, under the direction of the IT Lead Security Analyst, where appropriate.

Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate.

Participate in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Program, under the direction of the IT Security Manager, where appropriate.

Develop and communicate policies, procedures, and plans to executive team, staff, partners, customers, and stakeholders regarding technology and industry-specific laws.

Acquisition & Deployment

Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.

Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.

Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise's security documents specifically.

Operational Management

Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).

Maintain operational configurations of all in-place security solutions as per the established baselines.

Monitor all in-place security solutions for efficient and appropriate operations.

Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution.

Participate in investigations into problematic activity.

Participate in the design and execution of vulnerability assessments, penetration tests and security audits.

Provide on-call support for end users for all in-place security solutions.

Collaborate with IT, security, human resources, and legal to ensure full legal compliance of company policies, procedures, forms, notices, and materials.

Maintain a strong awareness of legislative changes or amendments to ensure ongoing and future compliance.

Advocate company's compliance policies via regular written and in-person communications.

Ensure that information security measures and equipment adhere to all applicable laws and regulations.

Incidental Functions

Participate in investigations to resolution and tracks solutions.

Assist in development and implementation of technical security policies.

Assist with the development of new computer and network security systems, includin