PRIMARY OBJECTIVE OF POSITION
Assist in protecting credit union technology assets and confidential data. Utilize analytics to assess system security and potential vulnerabilities and risks. Maintain system security following credit processes, procedures, and change management practices. Assist in implementation of new technologies and processes necessary to enhance security capabilities. Work with Information Technology staff and other essential credit union staff to quickly document and remediate identified vulnerabilities.
Â
ESSENTIAL JOB FUNCTIONS
- Utilize outside business partners and internal security systems to perform regular system risk assessments, penetration tests, social engineering, and vulnerability assessments.
- Produce reports and disseminate report summaries
- Track and report risk mitigation progress.
- Analyze all security reports and logs to,
- identify anomalies or risks
- identify security breaches or policy violations
- ensure compliance
- Work with process, systems and other asset owners to help identify and catalog high value assets, assess threats and vulnerabilities to determine risk, understand security and compliance posture, and drive risk treatment activities.
- Utilize services such as CIS Benchmarks to establish and implement system and application security benchmarks.
- Help to implement and integrate cyber risk management practices and capabilities across the organization.
- Participate in change management program to ensure that changes are in line with security guidance and benchmark expectations.
- Enhance tooling that will support risk management capabilities and processes across the organization.
- Provide input and execute on various risk management processes such as risk mapping.
- Help to develop and enhance risk management capabilities.
- Utilize report findings to notify appropriate personnel following incident response policy.
- Assist with maintenance of administered hardware including, but not limited to:
- Physical installation of new hardware
- system utilization and efficiency
- firmware updates and patches
- system configuration changes and upgrades
- Document all identified technology risks and resulting remediation actions following incident response procedures and policies.
- Document all security systems, applications, and configuration and any changes to those systems.
- Follow proper change management practices and testing procedures.
- Maintain knowledge of managed systems and environment thru approved training opportunities.
- Participate in departmental on call scheduling as well as weekly maintenance window schedules.
- All other duties as assigned.
Â
RELATIONSHIPS AND CONTACTS
Â
Reports to:Â Vice President of Information Security
Contacts: Frequent contact with other employees, departments, and outside vendors. Some contact with members.
THIS POSITION IS ON-SITE IN CORPUS CHRISTI TEXAS, WE DO NOT OFFER REMOTE WORK.Â