Information Security Specialist I-Enterprise Information Security Office
Detroit, MI, United States
Blue Cross Blue Shield of Michigan
Blue Cross Blue Shield of Michigan offers personalized medical, dental and vision coverage. Learn how we are committed to affordability and quality insurance.Departmental Preferences:
- Experience designing and developing Cortex XSOAR playbooks to automate security operations and incident response workflows
- Experience integrating third-party security tools and APIs into Cortex XSOAR to enhance automation capabilities
- Experience collaborating with security teams to understand their needs and translate them into effective automation solutions
- Experience using programming skills in Python or PowerShell for scripting and automation
Develop and manage information security initiatives for multiple IT functional area across the enterprise related to risk management, mitigation and response, compliance, control assurance, and user awareness. Develop and drive security strategies, policies/standards, ensuring the effectiveness of solutions, and providing security-consultative services to the organization. Work on multiple complex projects as team member or technical lead.
- Provide strategic and tactical direction and consultation on information security and compliance.
- Participate in security planning and analyst activities. Work in combination with IT Delivery Lead/Manager to ensure security is engaged in projects.
- Maintain an up-to-date understanding of industry best practices. Develop, refine and implement enterprise-wide security policies, procedures and standards to meet compliance responsibilities. Monitor the legal and regulatory environment for development. Monitor compliance with and recommend required changes to IT policies standards, guidelines, and procedures. Support service-level agreements (SLAs) to ensure that security controls are managed and maintained. Ensure security compliance with legal and regulatory standards.
- Develop processes and procedures for the information security governance program, including control document reviews, participant assessment preparation, meeting coordination, assessment finding mediation, assisting control owner with remediation plan development, tracking findings through remediation, progress monitoring, reporting and escalation.
- Engage directly with the business to gather a full understanding of project scope and business requirements. Provide security-related guidance on business processes. Work closely with IT and development teams to design secure infrastructure solutions and applications, facilitating the implementation of protective and mitigating controls.
- Work directly with the customers, third parties and other internal departments and organizations to facilitate information security risk analysis and risk management processes and to identify acceptable levels of residual risk. Participate in the development and maintenance of a global risk framework (a single view of the company’s risk profiles and tolerance.) Capture, maintain, and monitor information security risk in one repository.
- Consult with clients on the data classification of their resources. Assess threats and vulnerabilities regarding information assets and recommends the appropriate information security controls and measures. Define, recommend and manage security controls for information systems. Manage project documentation (compliance documentation, security plans, risk assessment, corrective action plans, etc.). Analyze reports and make recommendations as needed for management decisions.
- Perform security monitoring and reporting, analyze security alerts and escalate security alerts to local support teams.
- Provide security support for application- and infrastructure-related projects to ensure that security issues are addressed throughout the project life cycle. Define security configuration and operations standards for security systems and applications, including policy assessment and compliance tools, network security appliances, and host-based security systems. Define and validate baseline security configurations for operating systems, applications, networking and telecommunications equipment. Identify and coordinate resolution of information security recovery issues. Provides responsive support for problems found during normal working hours as well as outside normal working hours.
- Lead and respond to security incidents and investigations and targets reviews of suspect areas. Consult on teams to resolve issues that are uncovered by various internal and third party monitoring tools. Identify and resolve root causes of security-related problems.
- Develop and deliver security awareness and compliance training programs. Conduct knowledge transfer training sessions to security operations team upon technology implementation.
"Qualifications"
- Bachelor’s degree in related field preferred.
- Five (5) years of combined IT experience to include two (2) years of IT security work experience with a broad range of exposure to systems analysis, application development, systems administration.
- Knowledge and familiarity with security frameworks (e.g. HITRUST) preferred.
- Experience designing and implementing security solutions preferred.
- In-depth knowledge of security issues, techniques and implications across all existing computer platforms required.
- Strong analytical, problem solving, and consulting skills with knowledge of Information Security and related technologies.
- Knowledge of approaches, tools, and techniques for recognizing, anticipating, and resolving problems; ability to apply this knowledge to diverse situations.
- A high proficiency level in specific job related skills is required; accuracy and attention to detail skills.
- Written and verbal communication skills.
- Ability to work independently, or within a team environment.
- Other related skills and/or abilities may be required to perform this job.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: APIs Automation Compliance Governance HITRUST Incident response Monitoring Network security PowerShell Python Risk analysis Risk assessment Risk management Scripting SLAs SOAR Vulnerabilities XSOAR
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.