Analyst III - Information Security

USA - PA - Remote

AmerisourceBergen

AmerisourceBergen fosters a positive impact on healthcare around the world by advancing the development and delivery of pharmaceuticals and healthcare products.

View all jobs at AmerisourceBergen

Apply now Apply later

Our team members are at the heart of everything we do. At Cencora, we are united in our responsibility to create healthier futures, and every person here is essential to us being able to deliver on that purpose. If you want to make a difference at the center of health, come join our innovative company and help us improve the lives of people and animals everywhere. Apply today!

Job Details

POSITION SUMMARY:

This role is responsible for  providing strategic and tactical suggestions and consultation on information security (policies, procedures, standards) and compliance. The Analysts III reviews and analyzes security Issues and Risks to help identify their root causes to provide the necessary remediation. They help in implementing effective Information security assessments and thus ensure Information security compliance in the company. They support Lead Analyst in the design, development and execution of risk management practices including response, mitigation, compliance, assurance, and user awareness. They support the protection of corporate IT assets including Intellectual property, personal information, and regulated data, and manage security incidents and events. They contribute to the development and operation of security services for multiple systems.

PRIMARY DUTIES AND RESPONSIBILITIES:

  • Manages security planning, assessments and analysis activities and provides guidance on information security policies, procedures, standards, and compliance

  • Manages security incidents and events to protect corporate IT assets, including intellectual property, personal information, regulated data

  • Assists in defining processes and procedures for the information security governance program, Risk management programs and reports any process gaps to management and recommend possible solutions

  • Runs the Information security assessments and analysis using security tools

  • Manages, reviews, and responds to security alerts, escalations and incidents and identifies their root causes

  • Analyzes business processes and business requirements to determine conformance to security policies and procedures

  • Analyzes and reports concerning residual risk, vulnerabilities, and other security exposures, including misuse of information assets and non-compliance to senior technical executives

  • Identifies problems, determines accuracy and relevance of information, uses sound judgment to generate and evaluate alternatives, and makes recommendations

  • Assists Lead Analysts and other senior security executives in the development and implementation of strategies to align information security with company business objectives and goals, protecting the integrity, confidentiality, and availability of data

  • Provides ongoing knowledge transfer to Analysts I/II on security products and standards

  • Consults with other business and technical staff on potential business impacts of proposed changes to the security environment

  • Develops, operates, and manages security for multiple functional areas

  • Works with customers to identify security requirements using methods that may include risk and business impact assessments

  • Follows up on deficiencies identified in monitoring reviews, self-assessments, automated assessments, and internal and external audits to ensure that appropriate remediation measures are in place

  • Assists in developing, refining, and implementing enterprise-wide security policies, procedures, and standards across multiple platforms and application environments to meet compliance responsibilities

QUALIFICATIONS:

Education:

  • Bachelor’s Degree in Computer Science, Information Technology or any other related discipline or equivalent related experience.

Preferred Certifications:

  • Certified Cloud Security Professional (CCSP)

  • Certification in Information Security Strategy Management (CISM)

  • Certified Information Systems Security Professional (CISSP)

  • CompTIA Security + Certification

  • Systems Security Certified Practitioner (SSCP)

  • TS-SCI Security Clearance Certification

WORK EXPERIENCE:

  • Four (4) or more years of directly-related or relevant experience, preferably in information security.

SKILLS & KNOWLEDGE:

Behavioral Skills:

  • Critical Thinking

  • Detail Oriented

  • Impact and Influencing

  • Interpersonal Communication

  • Multitasking

  • Problem Solving

Technical Skills:

  • Application Architecture

  • Cybersecurity

  • Information Security Strategy Standards (SOX, ISO 27001/27002, COBIT, ITIL, NIST, PCI)

  • IT Risk Management

  • Network Solutions and Systems

  • Programming and Development

  • Root Cause Analysis

  • Software Development Life Cycle (SDLC)

  • Threat Modelling, Threat Hunting, Threat Intelligence

Tools Knowledge:

  • Microsoft Office Suite

  • Programming and Development Languages - JavaScript, HTML/CSS, Python, SQL

  • Security Tools - SIEM, EDR, Email Security Gateway, SOAR, Firewall, Anti-virus, Firewalls, VPN IDS/IPS, AV, proxies, etc.

What Cencora offers

We provide compensation, benefits, and resources that enable a highly inclusive culture and support our team members’ ability to live with purpose every day. In addition to traditional offerings like medical, dental, and vision care, we also provide a comprehensive suite of benefits that focus on the physical, emotional, financial, and social aspects of wellness. This encompasses support for working families, which may include backup dependent care, adoption assistance, infertility coverage, family building support, behavioral health solutions, paid parental leave, and paid caregiver leave. To encourage your personal growth, we also offer a variety of training programs, professional development resources, and opportunities to participate in mentorship programs, employee resource groups, volunteer activities, and much more. For details, visit https://www.virtualfairhub.com/cencora

Equal Employment Opportunity

Cencora is committed to providing equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, veteran status or membership in any other class protected by federal, state or local law.

The company’s continued success depends on the full and effective utilization of qualified individuals. Therefore, harassment is prohibited and all matters related to recruiting, training, compensation, benefits, promotions and transfers comply with equal opportunity principles and are non-discriminatory.

Cencora is committed to providing reasonable accommodations to individuals with disabilities during the employment process which are consistent with legal requirements. If you wish to request an accommodation while seeking employment, please call 888.692.2272 or email hrsc@cencora.com. We will make accommodation determinations on a request-by-request basis. Messages and emails regarding anything other than accommodations requests will not be returned

Affiliated CompaniesAffiliated Companies: AmerisourceBergen Services Corporation
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Analyst Jobs

Tags: Audits CCSP CISM CISSP Clearance Cloud COBIT Compliance CompTIA Computer Science EDR Firewalls Governance IDS IPS ISO 27001 ITIL JavaScript Monitoring NIST Python Risk management SDLC Security assessment Security Clearance Security strategy SIEM SOAR SOX SQL SSCP Strategy Threat intelligence VPN Vulnerabilities

Perks/benefits: Career development Health care Medical leave Parental leave Team events Wellness

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.