Skip navigation
Unable to save this job. Please try again later.

{msg}

Email this Job to Yourself or a Friend

To begin the application process, please enter your email address.

Company Contact Info

  • Battlefield, MO

Already have an account?

Sign in to apply with your saved resumes.

New to CareerBuilder?

Don't have an account? Continue as a guest!

Sorry, we cannot save or unsave this job right now.

Report this Job

Trust and Site Security Team.

Don't miss out on new jobs!

Get the latest Information Security Analyst jobs in Battlefield, MO delivered directly to your inbox. You can unsubscribe at any time.

Saving Your Job Alert

Job Alert Saved!

Could not save Job Alert!

You have too many Job Alerts!

This email address has reached the maximum of 5 email alerts. To create a new alert, you will need to log into your email and unsubscribe from at least one.

Sign Up

or   Sign In Here
Password Must Contain
• 
8 to 15 characters
• 
1 uppercase letter
• 
1 number or symbol
• 
1 lowercase letter
Cancel
Create an Account with CareerBuilder to save jobs & unlock these great features
See similar job titles and skills to help you make your next move
Upload a resume and become visible to Hiring Managers and Employers
Compare Salary Information to see where you stand amongst your peers
Easily Quick Apply to jobs with just one click!

Email Send Failed!

Information Security Analyst

Russell Cellular Inc • Battlefield, MO

Posted 9 days ago

Job Snapshot

Full-Time
Other Great Industries
Other

Job Competition

1

Applicant

How Do You Compare to the Competition?

Get facts about other applicants with a CareerBuilder Account

Job Description

ESSENTIAL FUNCTIONS:

Information security analysts must continually adapt to stay a step ahead of cyber attackers. They must stay up to date on the latest methods attackers are using to infiltrate computer systems and on IT security. Analysts need to research new security technology to decide what will most effectively protect their organization.

Key duties:

  • Monitor Russell Cellular's networks for security breaches and investigate a violation when one occurs
  • Test and monitor firewalls and data encryption programs, to protect sensitive information
  • Prepare reports that document security breaches and the extent of the damage caused by the breaches
  • Conduct penetration testing
  • Research the latest information technology (IT) security trends
  • Help plan and carry out Russell Cellular's way of handling security
  • Develop security standards and best practices for Russell Cellular
  • Recommend security enhancements to Management or our Senior IT staff
  • Help computer users when they need to install or learn about new security products and procedures


CB2

Job Requirements

Operations and Support

  • Plan, implement and upgrade security measures and controls
  • Protect digital files and information systems against unauthorized access, modification or destruction
  • Maintain data and monitor security access
  • Conduct internal and external security audits
  • Manage network, intrusion detection and prevention systems
  • Analyze security breaches to determine their root cause
  • Recommend and install appropriate tools and countermeasures
  • Define, implement, and maintain, corporate security policies
  • Security awareness training
  • Coordinate security plans with outside vendors

Key Technical Skills:

  • Penetration testing of applications and infrastructure – a good way to find vulnerabilities before attackers do
  • Social engineering – given that humans are the weakest link in the security chain, an analyst’s expertise can help with awareness training
  • Vulnerability and risk assessment – important components of risk management
  • Security assessments of network infrastructure, hosts and applications – another element of risk management
  • Forensics – investigation and analysis of how and why a breach or other compromise occurred
  • Troubleshooting – the skill to recognize the cause of a problem
  • DLP, AV, and anti-malware – an understanding of the tools used to protect the organization
  • TCP/IP, computer networking, routing, and switching – an understanding of the fundamentals: the language, protocol and functioning of the internet
  • ISO27001 assessment – specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization’s risk management
  • Endpoint protection technologies and techniques
  • NIST 800-53 and Cybersecurity Framework
Job ID: 2307908
Help us improve CareerBuilder by providing feedback about this job: Report this Job.
CAREERBUILDER TIP
For your privacy and protection, when applying to a job online, never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction. Learn more.
By applying to a job using CareerBuilder you are agreeing to comply with and be subject to the CareerBuilder Terms and Conditions for use of our website. To use our website, you must agree with the Terms and Conditions and both meet and comply with their provisions.
Don't miss out on new jobs like this
Get the latest jobs delivered to your inbox. Unsubscribe at any time.

Saving Your Job Alert

Job Alert Created

Well, this is embarrassing. We are having trouble saving your search. You can try again or come back at a later time.

Maximum Email Alerts

This email address has reached the maximum of 5 email alerts. To create a new alert, you will need to log into your email and unsubscribe from at least one.