×
Register Here to Apply for Jobs or Post Jobs. X

Senior Information Assurance Analyst - Oahu

Job in Honolulu, Honolulu County, Hawaii, 96814, USA
Listing for: Hawaiian Electric
Full Time position
Listed on 2026-01-03
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 125000 - 150000 USD Yearly USD 125000.00 150000.00 YEAR
Job Description & How to Apply Below

Overview

Senior Information Assurance Analyst - Oahu

Date:
Sep 15, 2025

Location:

Honolulu, Hawaii (HI), US, 96813

Company: hawaiianel

Posting End Date:
This position will remain open until filled. Early applications are encouraged.

Brief posting description: The P EJ INFORMATION ASSURANCE Department of the P INFORMATION ASSURANCE Division at Hawaiian Electric Company has 1 Management vacancy available. (Role: Professional)

Responsibilities
  • Oversees or performs the assessments of Company systems and networks and identifies deviations from cybersecurity policies, acceptable configurations, or guidance.
  • Provides consulting-level knowledge and expertise for the Information Assurance (IA) division, including development and enforcement of cybersecurity policies & standards, cybersecurity risk management, IT and OT compliance, and secure integration of grid technologies and cloud services.
  • Supports development of detailed plans and provides requirements for information systems’ security controls and security monitoring solutions.
  • Performs security control reviews to validate that designed controls operate effectively.
  • Develops policies, standards, and procedures to ensure that security controls are adequately designed.
Essential Functions
  • Performs cybersecurity assessments and provides security control requirements for IT and OT projects, including externally hosted applications and grid technology projects.
  • Develops and manages programs for privacy, e-discovery, security awareness training, digital forensics, patch management, vulnerability remediation, and other security and compliance programs.
  • Supports detailed review and approval processing for policies, processes, and procedures necessary to support the Company’s cybersecurity and compliance requirements.
  • Ensures that internal controls, processes, practices, and standards are developed, maintained, and tested to meet policy and compliance requirements.
  • Supports business continuity planning, disaster recovery planning, and the Company’s Cybersecurity Incident Management Team (CS-IMT), with occasional on-call support.
  • Participates in Company emergency response activities as assigned.
BASIC QUALIFICATIONS
  • Knowledge Requirements
  • Computer networking concepts and protocols, and network security methodologies.
  • Risk management processes (e.g., methods for assessing and mitigating risk).
  • Cybersecurity and privacy principles and organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation).
  • Laws, regulations, policies, and ethics related to cybersecurity and privacy.
  • Cyber threats and vulnerabilities.
  • Cryptography and cryptographic key management concepts.
  • Data backup and recovery concepts.
  • Host/network access control mechanisms (e.g., ACLs).
  • Network access, identity, and access management (PKI, OAuth, OpenID, SAML, SPML).
  • Network traffic concepts (TCP/IP, OSI, ITIL).
  • Programming language structures and logic.
  • System and application security threats and vulnerabilities (e.g., XSS, injections, race conditions, malware).
  • Network attack concepts and their relation to threats and vulnerabilities.
  • System administration, network, and operating system hardening techniques.
  • Different classes of attacks (passive, active, insider, etc.).
  • Different cyber attackers (script kiddies, insider threat, state-sponsored, etc.).
  • Cyber-attack stages (reconnaissance, scanning, enumeration, access, privilege escalation, maintenance, etc.).
  • Network security architecture concepts including topology, protocols, components, and defense-in-depth.
  • Security models (Bell-LaPadula, Biba, Clark-Wilson).
  • Ethical hacking principles and techniques.
  • Pent ration testing principles, tools, and techniques.
  • Conceptual knowledge of NIST, ISO 27000 series, OWASP, and other security frameworks/standards.
  • Conceptual knowledge of utility business and related OT systems (SCADA, DCS).
  • Skills Requirements
  • Conducting vulnerability scans and recognizing vulnerabilities in security systems.
  • Assessing the robustness of security systems and designs.
  • Detecting intrusions via intrusion detection technologies (e.g., Snort).
  • Mimicking threat behaviors.
  • Use of penetration testing tools and techniques.
  • Use of social…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary