• Information Security Analyst

    Job Locations US-MI-Grand Rapids
    ID
    2018-4128
    # of Openings
    1
    Type
    Full Time
    Category
    Information Technology
  • Overview

    Lake Michigan Credit Union is one of the largest financial institutions in Michigan and was established in 1933. We are seeking customer oriented individuals to join our team and help ensure our 5 star promise is carried out. As an employee, you'll enjoy a stimulating, professional atmosphere, supported by the latest technology and training. You will be encouraged to refine your existing skills in an environment of empowerment, gain new experiences, and progress to the limits of your own motivation. Lake Michigan Credit Union is looking for a dedicated individual to join one of our team as a Information Security Analyst.

    Responsibilities

    • Perform analysis to assess potential and actual risks, threats, and vulnerabilities that pertain to the protection of company a) information that is proprietary, confidential and/or otherwise requires protection from unauthorized access, and b) electronic devices upon which the company or its associates rely, for business purposes, to be free from compromise in availability, reliability and security.
    • Identify and implement solutions and the definition of corporate policies to protect corporate information and electronic devices, including use of techniques such as business practices, electronic controls, compliance monitoring, and enforcement.
    • Assess individual devices (servers, workstations, laptops, smartphones, network devices, etc.), departments, and network segments for security risks and standards compliance.
    • Review and inform company stakeholders on compliance with security and privacy related laws, regulations and industry standards and practices in place and pending.
    • Understand and develop procedures to regulate access to computer data files and prevent unauthorized modification, destruction, and disclosure of information and maintain role-based access controls (RBAC).
    • Work with computer user department and development staffs to request programming changes. Plan data security for new or modified software, accommodating issues such as associate data access needs and risk of data loss or disclosure.
    • Conduct security training, prepare data-use records for administration, answer questions in regards to computer security from both internal and external sources and audits unusual request for computer access or account changes.
    • Establish and maintain change and project management to support transition processes and constructing quality work plans and deliverables to meet communicated deadlines.
    • Research issues, problems or data security breaches and develop solutions to problems that are rare and unusually complex and creates new methods or processes.

    Qualifications

    • Minimum 7 years’ experience:
      • Experience with the architecture associated with identity management systems
      • Experience with the implementation of encryption software
      • Experience with security information and event management systems
      • Experience implementing technical solutions in support of a defense-in-depth strategy
    • Bachelor’s Degree in a technical discipline preferred
    • CISSP certification preferred
    • Advanced knowledge of the techniques used to cause, detect and prevent or remediate security problems and end-user devices, computers and network systems
    • Demonstrated skill in performing post-incident computer forensics without destruction of critical data
    • Sufficient technical expertise to recognize the applicability of emerging technologies for business needs and to direct evaluations, cost/benefit analyses, and implementations of new technology
    • In-depth knowledge of security standards and experience in their implementation
    • Ability to design, implement, operate and maintain technical solutions to information security-related problems
    • Advanced knowledge of business protection systems and technology associated with information security
    • Advanced knowledge of information security best practices and regulations
    • Ability to install and configure security software in computer networks
    • Knowledge and use of relevant PC software applications and skills to use them effectively
    • Demonstrated ability to communicate effectively both verbally and in writing

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed

    Connect With Us!

    Not ready to apply? Connect with us for general consideration.