Sign up
Sign up
Description
The Cyber Security Risk Analyst II is responsible for ensuring information security best practices relating to issues such as: collaborate in the development of IT standards and policy for systems; conducting/coordinating information security risk assessment and analysis; establishing reasonable information security guidelines; assisting with monitoring and management of systems security vulnerabilities; conducting/coordinating information security audits (Assessment and Authorization processes) and oversight of the exception process, conduct information security reviews of third parties in the supply chain, assist in providing responses to questions from other departments and third parties about the Company’s security posture and controls.
Required Qualifications
Preferred Qualifications
Reporting Relationships:
Reports to Manager or Executive level position
Notice:
This position requires access to information that is subject to control by the Export Administration Regulations and/or the International Traffic in Arms Regulations. Any offer of employment shall be contingent upon the Company’s verification that the candidate is a “U.S. Person” or upon the receipt of all necessary export licenses or authorizations that may be required by U.S. export control laws. “U.S. Persons” are defined as U.S. citizens, U.S. lawful permanent residents (i.e., “green card” holders), or any individual granted protected status under the Immigration and Nationality Act (8 U.S.C. § 1324b(a)(3)), including asylees and refugees. In the event a candidate refuses or cannot otherwise provide the necessary information for the Company to determine whether such licenses may be required, or for the Company to obtain any required licenses, the Company shall maintain the exclusive right to discontinue the application process and/or withdraw any contingent offer that has been made.
Description
The Cyber Security Risk Analyst II is responsible for ensuring information security best practices relating to issues such as: collaborate in the development of IT standards and policy for systems; conducting/coordinating information security risk assessment and analysis; establishing reasonable information security guidelines; assisting with monitoring and management of systems security vulnerabilities; conducting/coordinating information security audits (Assessment and Authorization processes) and oversight of the exception process, conduct information security reviews of third parties in the supply chain, assist in providing responses to questions from other departments and third parties about the Company’s security posture and controls.