18 November 2022
Responsible for analyzing and auditing the security of enterprise systems discovering and addressing security issues, building processes and automation, and quickly solving new security
Proactively manage, monitor, and resolve security anomalies.
Deliver ongoing support to end users by providing prompt and complete resolution to technical
challenges and business issues related to security.
Proactively identify and implement operational security improvements, enhancements, and
system customizations to mitigate security risk.
Utilize existing enterprise security tools and develop and/or deploy additional tools that enable
increased visibility and awareness of known and potential threats.
Audit, risk and control management, and systems documentation activities.
Proactively identify areas requiring attention or improvement.
Document security architecture, infrastructure components, and operating procedures.
Provide users and management with technical support on matters related to information security.
Develop, document, and refine processes.
Ensure that secure practices, procedures and policies are designed and implemented, provide
input into future state decisions regarding information security technology design.
Maintain a state of awareness of risk and control trends and industry benchmarking to prepare
for and monitor upstream risks and control and issues.
Creatively solve unfamiliar challenges, using personal integrity and sound judgment, while
maintaining strict confidentiality when needed.
Improve employee engagement by advancing teamwork, transparency, and accountability.
Be a critical contributor to the overall improvement of security operations effectiveness by
working closely with internal and external teams to understand threats, security gaps, process
Desired Candidate Profile
Log, track and complete security event/alert ticket requests.
Perform basic to moderate statistical work and data analysis.
Ensure confidentiality within all areas of responsibility.
Perform additional duties as required
Level 1. phishing backlog
Proactively manage, monitor, and resolve security anomalies