Data Security Analyst II
Listed on 2025-12-27
-
IT/Tech
Cybersecurity, IT Consultant, Systems Administrator, IT Specialist
Data Security Analyst II – The Exchange
Job Description
Applies expert knowledge of the Exchange IT security management program to ensure the information technology infrastructure, including the assets themselves, the network, and company data are protected from both intentional and inadvertent access and destruction. The tasks associated with this support may include, but are not limited to, implementing security controls to mitigate threats from both internal and external sources, interfacing with the user community to understand their security needs, implementing procedures to accommodate business requirements.
Ensures that the user community understands and adheres to the necessary procedures to maintain security. Ensures data and systems integrity, confidentiality, and availability by administering appropriate security controls set by Exchange IT security program, IT architecture, compliance requirements, policies and procedures. Conducts accurate evaluations of the level of security required. Must be able to weigh business needs against security concerns and articulate issues to management.
Monitors and tunes the IT security networks and servers to achieve optimum performance. Develops and maintains standard operating procedures and documentation, provides project leadership for the planning and execution of major security projects. Defines disaster recovery requirements and plans and delivers a disaster recovery solution for the security networks and servers. Coordinates with business units, the project management office (PMO), outside entities and IT staff to confirm compliance and risk mitigation has been met.
Serves as second level support by identifying, evaluating, and troubleshooting non-routine events and incidents with security networks and servers. Responds to telephone calls and email requests for the security networks and servers management processes. Safeguards physical access to Exchange restricted data, processes and services.
- Five years of experience in maintaining computer systems identifying, reporting, and resolving security violations.
- Or Bachelor's degree and three years of experience in maintaining computer systems identifying, reporting, and resolving security violations.
- A+
- NETWORK+
- SSCP
- GSEC
- SECURITY+
- SCNP
- CISA
- CISSP
- GSE
- SCNA
- BACHELORS DEGREE - Preferred
- INFORMATION TECHNOLOGY - Preferred
- Work Schedule – Onsite
- PCS Not Authorized/LSP Not Authorized
- ACTIVE DIRECTORY - Preferred
- AIX & LINUX SECURITY - Preferred
- ENCRYPTION & KEY MANAGEMENT - Preferred
- NETWORK SECURITY - Preferred
- REMOTE ACCESS ADMINISTRATION - Preferred
- SERVER ADMINISTRATION - Preferred
- TSS/MAINFRAME SECURITY - Preferred
- WIRELESS SECURITY - Preferred
$71,355.00
Major Duties- Manages provisioning to user accounts and network access.
- Develops and implements remediation as it relates to findings found in monitoring/logging of IT systems and reports on IT related security incidents, violations & anomalies.
- Researches, evaluates and implements security solutions.
- Implements/maintains security applications.
- Conducts forensics and investigations.
- Performs other duties as assigned.
- Changing Security Threats Awareness
- 24x7 work environment supporting Exchange operations, which requires either shift work, on call, and/or after hours project work and may include holidays, and weekends
- IT environment is constantly changing demanding quick solutions and evolving skills
- IT position located at HQ
- IT position - there may be some TDY associated with this IT work
Management
Number of Positions Remaining1
Job Grade4
Job Tier3
Career AreaInformation Technology
SupervisorNo
Seniority levelMid-Senior level
Employment typeFull-time
Job functionInformation Technology
IndustriesRetail
#J-18808-Ljbffr(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).