Risk Management Security Analyst
Listed on 2025-12-25
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Data Security
Position Summary
The Risk Management Security Analyst is responsible for assisting Access Health CT (AHCT) with its Information Security Risk Management Program, satisfying both regulatory compliance requirements and managing security risk to an acceptable level. This role is a hands‑on role that will be responsible for actively identifying, detecting, monitoring, maintaining, analyzing, advising, and responding to ongoing IT security and compliance needs under the guidance of the Associate Director, IT Security & Compliance.
The individual selected for this role will collaborate with various cross‑functional teams inclusive of partners and vendors in identifying, evaluating, categorizing, tracking and monitoring enterprise IT security risk and will assist with development and maintenance of IT security controls in adherence with federal and other government required cyber security frameworks.
Furthermore, the individual in this role will be responsible for assisting with development, automation, and ongoing maintenance of end‑to‑end risk register and related risk management work streams and processes (i.e., risk assessments, risk mitigation strategies, etc.) by utilizing existing Archer Governance, Risk, and Compliance (GRC) platform and other state‑of‑the‑art security tools. This role reports to the Associate Director of IT Security and Compliance and has no direct reports.
* Please note that this position is available to individuals authorized to work in the U.S. without the need for sponsorship*
Responsibilities- Conduct third‑party security risk assessments and security reviews in accordance with regulatory requirements.
- Collaborate with IT, Legal, product owners, and business teams to ensure appropriate IT Security and Compliance requirements are incorporated into new and ongoing engagements and initiatives.
- Support development, maintenance, and operation of a centralized enterprise cyber risk register and associated activities in Archer GRC platform.
- Define and report on key risk metrics to Management on a regular basis.
- Liaise with IT, Legal, product owners, and business teams to provide accurate and timely responses to internal and external IT Security and Compliance inquiries and related activities.
- Assist with technical vulnerability assessments and security reviews of infrastructure, network, applications, and databases, utilizing Nessus scanning software and other state‑of‑the‑art security tools.
- Facilitate, track, and manage vulnerability remediation based on risk categorization, with timely assessing and communicating risk, documenting, and reporting on mitigation status.
- Actively monitor, analyze, and generate reports on company’s security landscape utilizing SIEM and other state‑of‑the‑art security tools.
- Provide guidance, technical expertise, and training to the enterprise to ensure optimal use of the Archer GRC platform.
- Develop and maintain technical documentation, such as security control implementations, System Security Plan (SSP), user guides, process documentation, and configuration details.
- Identify opportunities for process optimization, automation, and streamlining tasks.
- Participate actively in frequent regulatory submissions and inquiries.
- Manage and continuously monitor remediation plans for compliance and mitigation of risk.
- Assist with responding to information system security incidents, including investigation of, countermeasures to, and recovery from computer‑based attacks, unauthorized access, and policy breaches.
- Bridge information security requirements with business processes and IT systems and projects.
- Analyze and recommend security controls and procedures in business processes related to use of information systems and assets, and monitor for compliance.
- Develop, administer, and provide advice, evaluation, and oversight for information security training and awareness programs.
- Maintain a current and comprehensive understanding of relevant industry standards to incorporate into the risk management strategy, framework, and program.
- Completes other tasks, as assigned.
- Bachelor’s degree in Management Information Systems, Cybersecurity, Computer Science…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).