Security Analyst I job – International Paper – Memphis, TN

This position is responsible for supporting the implementation and testing of InfoSec Operations security solutions, processes and procedures in accordance with Information Security’s direction as it relates to the deployment of International Paper’s Information Security strategy, plan and operating model.

Key Customers: All internal and external users of the IP Global Data Network.

Key Actions: Responsible for monitoring the global data network and systems and maintaining security by 1) monitoring security requests and devising solutions for the requests, and meet SLO guidelines 2) monitoring network traffic (internal and perimeter) and managing alerts from those systems, 3) managing internet content filtering and associated tools, 4) assisting in the remote access process, 5) monitoring and maintaining the enterprise endpoint security solution, 6) performing periodic reviews to affirm adherence with security guidelines and policies and 7) performing secondary support duties for enterprise security solutions where needed.

This position impacts the end user’s ability to effectively access systems and networks. If a user cannot access our global data network effectively, it can negatively affect the company financially and operationally. The scope of work includes all applications, systems and users accessing International Paper’s global data network.

Key Accountabilities:
Under direct supervision individual will be responsible for the following tasks (by IS domain):

Domain 1: Maintain Enterprise Information Security (IS) Framework

Define Risk, Posture, & Value Proposition

Participate in InfoSec Operations applicable areas of the annual enterprise information security risk assessment as appropriate.

Maintain Capability Architecture & Strategy

Assist the IT Strategy Planning & Architecture group in maintaining and managing IS service provider framework by providing input and applicable data as needed.

Domain 3: Applications & Data Security

Maintain A & D Security Implementation Architecture and Plan

Under the direction of the IS Application & Data Security Lead, assist in drafting the initial communication of the viable reference physical A&D architecture, and the A&D implementation architecture and plan.

Provide requested input to the IS Application & Data Security Lead to assist in creating and maintaining the A&D SLAs, security index and metrics.

Ensure Secure Applications

Under the direction of the IS Application & Data Security Lead, implement and perform application security monitoring.

Under the direction of the IS Application & Data Security Lead, assist with the implementation of the category-specific application logging and security measures necessary to meet desired security levels.

Under the direction of the IS Application & Data Security Lead, regularly assess and test necessary application components for vulnerabilities.

Under the direction of the IS InfoSec Application & Data Security Lead, assist with drafting the initial communication of the Application & Data security risk assessment findings.

Protect Data

Under the direction of the IS Application & Data Security Lead, assist with drafting the initial communication of the Application & Data security risk assessment findings.

Under the direction of the ISApplication & Data Security Lead, implement and perform data security monitoring.

Under the direction of the IS Application & Data Security Lead, assist with the implementation of the category-specific data logging and security measures necessary to meet desired security levels.

Under the direction of the IS Application & Data Security Lead, regularly assess and test necessary data stores for vulnerabilities

Manage and Measure A & D Security Capability

Under the direction of the IS Application & Data Security Lead, assist in drafting the initial communication of the A&D implementation architecture and plan.

Provide the IS Application & Data Security Lead assistance in drafting the initial communication of the A&D security operating model.

Under the direction of the IS Application & Data Security Lead, evaluate exception requests, provide recommendations to resolve exceptions to A&D Security standards and procedures and assist in preparing the presentation materials. Upon approval, provide necessary assistance to implement resolution.

Provide requested statistical data to the IS Application & Data Security Lead to assist in measuring and reporting on the A&D Security performance to metrics and SLAs.

Under the direction of the IS Application & Data Security Lead, prepare the initial (draft) A&D Security communications and training materials according to the guidelines and standards established by the ITSS IS Security Solutions group.

Under the direction of the IS Application & Data Security Lead, review the A&D capability model and offer recommendations for improvements. Upon approval, implement A&D security capability model improvements.

Domain 4: Infrastructure Security

Maintain Infrastructure Security Implementation Architecture & Plan

Under the direction of the IS InfoSec Operations Analyst III Infrastructure Security Lead, assist in drafting the initial communication of the Infrastructure Security implementation architecture and plan.

Provide the approved In-scope network, hardware, and software asset inventories to key stakeholders and other appropriate parties.

Under the direction of the IS InfoSec Operations Analyst III Infrastructure Security Lead, assist with developing the recommendation for the Infrastructure security architecture.

Provide requested input to the IS InfoSec Operations Analyst III Infrastructure Security Lead to assist in creating and maintaining the Infrastructure security SLAs, security index and metrics.

Monitor Infrastructure & Prevent Vulnerabilities

Assist in compiling and maintaining the list of current, relevant potential application, data and infrastructure vulnerability threats and counter measures.

Under the direction of the IS InfoSec Operations Analyst III Application & Data Security Lead, implement and perform infrastructure security monitoring.

Under the direction of the IS InfoSec Operations Analyst III Infrastructure Security Lead, assist with the implementation of the category-specific infrastructure security logging and security measures necessary to meet desired security levels.

Under the direction of the IS InfoSec Operations Analyst III Infrastructure Security Lead, regularly assess and test necessary infrastructure components for vulnerabilities (e. g., intrusions, viruses, improper content).

Secure Systems and Networks

Under the direction of the IS InfoSec Operations Analyst III Infrastructure Security Lead, assist in preparing the initial (draft) communication of the Infrastructure vulnerability assessment findings (by category, e. g., desktop, server, and network/firewall) and recommendations.

Under the direction of the IS InfoSec Operations Analyst III Leads, assist in compiling and maintaining the list of current, relevant potential application, data and infrastructure vulnerability threats and counter measures.

Under the direction of the IS InfoSec Operations Analyst III Infrastructure Security Lead, implement the system and network security operations processes.

Under the direction of the IS InfoSec Operations Analyst III Infrastructure Security Lead, regularly assess and test necessary infrastructure components for correctly implemented security measures.

Manage & Measure Infrastructure Security Capability

Under the direction of the IS InfoSec Operations Analyst III Infrastructure Security Lead, assist in drafting the initial communication of the Infrastructure Security implementation architecture and plan.

Provide the IS InfoSec Operations Analyst III Infrastructure Security Lead assistance in drafting the initial communication of the Infrastructure security operating model.

Under the direction of the InfoSec Operations Analyst III Lead, evaluate exception requests and provide recommendations to resolve exceptions to Infrastructure Security standards and procedures and assist in preparing the presentation materials. Upon approval, provide necessary assistance to implement resolution.

Provide requested statistical data to the IS InfoSec Operations Analyst III Infrastructure Security Lead to assist in measuring and reporting on the Infrastructure Security performance to metrics and SLAs.

Under the direction of the IS InfoSec Operations Analyst III Application & Data Security Lead, prepare the initial (draft) Infrastructure Security communications and training materials according to the guidelines and standards established by the ITSS IS Security Solutions group.

Under the direction of the IS InfoSec Operations Analyst III Infrastructure Security Lead, review the Infrastructure capability model and offer recommendations for improvements. Upon approval, implement the Infrastructure security capability model improvements.

Domain 5: Manage & Govern Information Security Operations

Manage Incidents & Investigations

When appropriate, assist in responding to incidents and investigation requests to minimize loss as appropriate. Communicate status and recommend changes to prevent future occurrences to the ITSS IS Security Solutions Manager.

Provide General Guidance, Awareness, & Training

Under the direction of the IS InfoSec Operations Analyst III Leads and Application, Data and Infrastructure Security Lead help design and create communications and training materials according to the guidelines and standards established by the ITSS IS Security Solutions group.

Maintain & Report Performance Metrics

Provide requested statistical data to the IS InfoSec Operations Analyst III Leads to assist in measuring and reporting on the Application, Data and Infrastructure Security capability or SLA performance metrics.

Key Challenges:
The external environment, including technology, competition, markets:

The primary challenge this position faces in the external market will be to remain technically qualified in light of the fast change of pace in Information Technology in the security realm; specifically the ability stay abreast of new IT Security threats and vulnerabilities.

The internal environment, including interaction with others, (both inside and outside the company) policies/practices:

Internal challenges include:
Overcoming the resistance to change and the perception that security is a hindrance or necessary evil.

Building credibility by continually working on knowledge of industry best practices and practical application for IP.

Partnering with key customers building a relationship that fosters cooperation and knowledge sharing.

The work itself, e.g., problems, opportunities, change:
Because of the internal and external interaction that will be required, the primary challenge will be to keep both technical and interpersonal/political savvy skills polished at all times.

Because security is becoming increasingly critical, being an advocate for security both with peers and upper management.

Knowledge and Experience:
The ideal candidate will have experience in the following areas:

Necessary Knowledge, Skills and Experience:
Minimum of 4-6 years technical experience

Minimum of 1 year IT Security experience

Hands-on, technical design and blue printing in one or more of the following areas experience in one or more or more of the following areas : Windows (Windows XP/7/8); Active Directory multi-domain design; group policy; LDAP), UNIX (Solaris; AIX; Linux; BSD), Telecommunications (Cisco; WAN/LAN; firewalls; VPNs; wireless; MPLS, RF), Relational Databases (Oracle; SQL Server; MySQL; MaxDB), JCL, DB2, MVS, CICS, and TSO; TOPSECRET, RACF;CUA, Web Design and hosting concepts and remote access solutions and architecture

Working knowledge of firewalls and supporting hardware and software such as Cisco PIX, Checkpoint, Blackice Defender; Zonealarm, Linksys Hardware

Working knowledge of host and network-based intrusion detection technologies such as Snort, ISS, Nessus, Whisker, WebInspect

Solid communication (written and oral) and interpersonal skills

Solid analytical and problem solving skills with the ability to formulate security solutions based on business requirements.

Preferred Knowledge, Skills and Experience:
Certification preferred. CISSP, CISM, GIAC or CISA.

Past experience with business analysis and design with exposure to customers is preferred.

Ability to produce, modify and utilize grayhat tools utilizing dominant scripting technologies (PERL; Shell Scripting; VB) is preferred.

Experience with commercial or underground vulnerability scanning tools (Nessus, Nmap, CyberCop, ISS) is preferred.

Educational Re quirements and Certifications:
Bachelor’s degree in Computer Science, Information Systems or other related field, or equivalent work experience

Necessary competencies:
Action Oriented (1)

Time Management (62)

Technical Learning (61)

Learning on the Fly (32)

Problem Solving (51)

Perseverance (43)

Customer Focus (15)

Listening (33)

Important competencies:
Dealing with Ambiguity (2)

Priority Setting (50)

Functional/Technical Skills (24)

Timely Decision Making (16)

Peer Relationships (42)

Written Communication (67)

Interpersonal Savvy (31)

Integrity & Trust (29)

Self Development (54)

About secureteam

secureteam
A Computer Programmer whose articles got mentions from the likes of The New York Times, Kissmetrics and AllTopStories. He writes articles, novels and poems; spends most of his time reading everything he could get his hands on. He is currently pursuing his Masters from The University of Illinois and holds a Bachelors in Electronics Engineering from the University of California. He is a programmer, a motivational writer and speaker.

Leave a Reply

Your email address will not be published. Required fields are marked *