Senior Information Security Analyst
Victor, NY, United States
Full Time Senior-level / Expert USD 113K - 151K
CooperCompanies
CooperVision, a division of CooperCompanies (NASDAQ:COO), is one of the world’s leading manufacturers of soft contact lenses. The Company produces a full array of daily disposable, two-week and monthly contact lenses, all featuring advanced materials and optics. CooperVision has a strong heritage of solving the toughest vision challenges such as astigmatism, presbyopia and childhood myopia; and offers the most complete collection of spherical, toric and multifocal products available. Through a combination of innovative products and focused practitioner support, the company brings a refreshing perspective to the marketplace, creating real advantages for customers and wearers. For more information, visit www.coopervision.com.
Job Summary:
The Senior Information Security Analyst is responsible for providing advanced security expertise to all levels of the global company and partnering with various parts of the organization to reduce enterprise risk.
- Provide leadership and direction for the integration of security culture and design within business and IT strategy; work with the Engineering teams to ensure that security considerations are included in systems architecture and help to identify, evaluate, and select security solutions to meet information security/compliance needs.
- Coach and mentor junior team members to develop well-rounded information security skillsets.
- Continuously evaluate the effectiveness of the SOC and make recommendations for continuous improvement.
- Work with compliance teams to ensure solutions meet security policies and procedures.
- Perform senior-level administration and tuning of security management tools including SIEM, NAC, firewalls, IDS/IPS, secure email gateway, etc.
- Perform proactive threat hunts within the environment.
- Investigate incidents escalated from Managed Security Services Provider (Level 1) and junior Analysts, performing second and third level analysis to assess risk.
- Lead technical cyber incident response efforts as an active Cybersecurity Incident Response Plan (CIRP) participant, guiding team members and peers from identification through recovery.
- Provide detailed guidance to technical teams for their respective platforms, facilitating system hardening and incident response.
- Lead the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) in partnership with the Information Security Engineers and under the direction of the Information Security Manager.
- Prioritize vulnerability assessment output based on a deep understanding of exploitability, impact and likelihood of a given threat.
- Build processes around complex forensic techniques and procedures on critical systems.
- Enhance Security Engineering accomplishments and competence by planning delivery of solutions; answering technical and procedural questions for less experienced team members; teaching improved processes; mentoring team members.
- Design, scope, and lead deep technical assessments on internal and external systems.
- Define incident response playbooks for IT and Information Security personnel to follow when responding to common issues (e.g., malware infection, phishing, etc.)
- Act as a Subject Matter Expert within all Information Security disciplines.
- Coordinate and help implement significant security projects in conjunction with Information Security Engineers.
- Effectively communicate business risk and associated recommendations, finding nuanced solutions to complicated problems.
- Participate in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, under the direction of the Manager of Application & Continuity Services.
- Document and communicate effectively with both technical and management level audiences.
- Be an advocate for security best practices and promote security awareness at all levels. Handle sensitive/confidential security issues in a professional and confidential manner.
- Perform other duties as assigned.
Travel Requirements: 5% domestic and/or international travel
Knowledge, Skills and Abilities:
- Detailed understanding of security frameworks, controls, and concepts such as NIST 800-53, ISO 27001, CIS Critical Controls, Cyber Kill Chain, MITRE ATT&CK framework, OWASP Top 20, etc.
- Have in-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls.
- Deep understanding of infrastructure such as network switches, routers, firewalls and VPN, network security, administration of DLP, antivirus\antimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs.
- Knowledgeable of and experience with security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering.
- Ability to analyze and recommend changes to existing security landscape where necessary to meet information security objectives.
- Vulnerability scanning and pen testing experience.
- Incident response and digital forensic experience.
- Have experience developing policies, procedures, standards, and guidelines
- Good business process knowledge and understanding of business drivers and business objectives to translate them into security requirements.
- Strong analytical skills to analyze security requirements and relate them to appropriate security controls.
- Understanding of common cloud technologies and platforms and how to secure them.
- Ability to interact with CooperVision personnel and build strong relationships at all levels, and across all business units and organizations, and to understand business imperatives.
- Strong leadership abilities, with the capability to develop and guide information security team members and IT operations personnel, and to work with minimal supervision.
- Excellent verbal, written and interpersonal communication skills, including the ability to communicate effectively with the IT organization, project and application development teams, management, and business personnel.
Work Environment:
- Normal office environment.
- Prolonged sitting in front of a computer.
- Occasionally lift up to 25 pounds.
- Participate in 24x7x365 on-call rotation for emergencies and escalations.
Experience:
- Minimum 5-10 years’ professional IT experience.
- 3-6 years of professional Information Security experience.
- At least 3 years’ experience in working in geographically dispersed technical support teams.
- Be familiar with applicable legal and regulatory requirements, including, but not limited to, the U.S. Sarbanes-Oxley Act (SOX), the U.S. Health Insurance Portability and Accountability Act (HIPAA), European General Data Protection Regulation (GDPR), various other domestic and international privacy regulations, and Payment Card Industry (PCI) security council standards.
Education:
- Bachelor’s degree in computing science or cybersecurity; or an equivalent combination of education and experience. Post-graduate education or training a plus.
- Security certifications such as: GIAC, CISSP, CISM, Cisco Security or similar preferred
Affirmative Action/Equal Opportunity Employer. Minority/Female/Disability/Veteran
For U.S. locations that require disclosure of compensation, the starting base pay for this role is between $113,336.00 and $151,114.00 per year and may include cost of living adjustments. The actual base pay includes many factors and is subject to change and modification in the future. This position may also be eligible for other types of compensation and benefits.
#LI-RK1
Tags: Antivirus CISM CISSP Cloud Compliance Cyber Kill Chain DNS Encryption Firewalls GDPR GIAC Hashing HIPAA IDS Incident response Intrusion detection IPS ISO 27001 Malware MITRE ATT&CK Monitoring Network security NIST NIST 800-53 OWASP Pentesting Privacy SIEM SMTP SOC SOX Strategy Teaching VPN Vulnerability scans
Perks/benefits: Health care Insurance
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.