Cyber Security Analyst, IT Security and Compliance
The Cyber Security Analyst, IT Security and Compliance position is a hands-on role that involves evaluating and enforcing security and compliance controls. This position plays an integral role in protecting the Cornerstone OnDemand (CSOD) from internal and external threats and work closely with our technology teams to define the security best practices, perform architecture and design reviews, threat modeling, conduct security assessment, and support the identification, interpretation, and remediation of vulnerabilities across CSOD tech stack.
We are looking for someone with a strong background in information security and a proven ability to deliver under pressure
In this role you will...
Design, develop, coordinate and document the secure operation of information systems and develop best practices for securing enterprise wide data and information systemsConduct vulnerability threat assessments on existing application and systemsProactively monitor security levels of IT systems and establish baseline security models including patching, misconfigurations, vulnerabilities, CIS and end point controlsEnsure monthly program review is completed and compliance reported to management and recommend action plans to mitigate security gapsEvaluate and respond to global information technology security threats in relation to systems and recommend security changes in response to emergent threatsImplement and maintain technical solutions to support compliance frameworks requirements including FedRAMP, ISO 27001 and PCI-DSSThe ideal candidate should have a strong technical background in security technologies, including Tenable, CrowdStrike, DLP (Data Loss Prevention), CSPM (Cloud Security Posture Management), SOC (Security Operations Center) management with tools like Splunk and QRadar, incident management.Experience with tools such as Jira and Confluence.Hands-on experience with cloud platforms like AWS, Azure, and GCP is a significant advantage.
Key Responsibilities:
Security Technology Management:Manage and maintain security technologies such as Tenable, CrowdStrike, DLP, SOC tools (Splunk, QRadar), IDS, and IPS.Configure and monitor these technologies to proactively identify and mitigate security threats.Incident Response:Monitor, investigate, and respond to security incidents.Coordinate incident response activities and collaborate with relevant teams to ensure timely resolution.Logging and Monitoring:Utilize Splunk, QRadar, and other SOC tools for log analysis and monitoring.Develop custom dashboards, alerts, and reports to detect and respond to security incidents.Vulnerability Management:Identify vulnerabilities using vulnerability scanning & threat detection tools.Prioritize and remediate vulnerabilities in a timely manner.Data Loss Prevention (DLP):Implement and manage DLP solutions to safeguard sensitive data.Develop and enforce policies for data protection.Cloud Security:Hands-on experience with AWS, Azure, and GCP.Implement cloud security best practices and leverage CSPM tools to ensure a secure cloud posture.Third-Party Risk Management:Assess and manage third-party security risks by evaluating vendor security practices and compliance.Security Compliance:Ensure compliance with international security standards and frameworks (e.g., ISO 27001, NIST, GDPR,PCI, FedRAMP).Implement and maintain security policies and procedures in line with compliance requirements.Intrusion Detection and Prevention:Manage and monitor IDS and IPS systems to detect and prevent security threats.Incident Management:Manage and document security incidents using incident management tools like Jira and Confluence.Maintain incident response playbooks and ensure continuous improvement.
You've got what it takes if you have...
3-5 years of experience in a similar security analyst role.Proficiency in Tenable, CrowdStrike, DLP, CSPM, SOC tools (Splunk, QRadar), IDS, IPS, and Incident Management.Experience with Jira and Confluence for RCA Analysis, Incident tracking and documentation.Hands-on experience with AWS, Azure, and GCP.Strong knowledge of third-party risk management.Familiarity with international security compliance standards and regulations.Relevant certifications such as CISSP, CISM, or equivalent is a plus.