Information Security Network Analyst II Internet & Ecommerce - Jackson, MS at Geebo

Information Security Network Analyst II

Company Name:
Trustmark National Bank
The purpose of this job includes overall responsibility for monitoring network infrastructure devices and reports for unauthorized access, security vulnerabilities, and maintaining a technology risk assessment process to identify risks associated with the Trustmark network devices, as well as making recommendations for correcting or mitigating those risks. Periodic network vulnerability assessments, searching the Internet for possible Phishing sites, oversight of the Patch Management process, and coordinating the annual external assessment are also important functions of this job, as well as the training of associates and assisting the manager as needed.
Responsible for monitoring of event logs and escalating as appropriate to resolve suspected and detected incidents of network misuse
Responsible for reviewing and reporting of vendor-related vulnerabilities (Patch Management) and, if necessary, assist the Information Technology group with prioritizing and escalating the implementation of updates to correct reported issues
Responsible for overseeing the Information Security Technology Risk Assessment processes and reporting to management, including assisting Manager with creating the required Annual Board Reports regarding the Information Security Program
Responsible for the development and implementation of network scans and providing vulnerability reports to management
Responsible for monitoring, coordinating, and assisting with questions and changes pertaining to Trustmark's firewall and Intrusion Detection and Site Blocking systems
Responsible for recommending steps to follow regarding possible investigations dealing with the misuse of network resources and unauthorized access to sensitive customer information within the Trustmark network and Service Provider locations and ensuring that the chain of custody is documented and maintained as appropriate
Broad knowledge of OCC and FFIEC regulations relative to a Financial Institution's Information Security Program or comparable information security compliance requirements such as HIPAA
General knowledge of requirements of 12 C.F.R. Part 30, Section 501b and the Interagency Guidelines Establishing Standards for safeguarding customer information preferred
In-depth knowledge of multiple Operating Systems
Broad knowledge of network infrastructure
General knowledge of process for implementing software security patches
General knowledge of the principles of risk assessment
Broad knowledge of computer forensics
Clear verbal communication skills
Interpersonal skills with leadership potential
Time management skills and experience in managing multiple tasks
Writing skills related to management reporting
Detail oriented
Ability to use anti-virus tools in determining the existence of a virus on a network device
Ability to develop and implement network security measures
Ability to investigate information security incidents
Four year college degree preferred
Minimum of two-year college degree or equivalent network and/or client/server work experience required
Security certifications required; Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), or equivalent preferred
Work experience related to network and/or information security required
Work experience with installing operating systems and application software on end-user computing systems required
Work experience in implementation of client/server policies using best practices
Date: 2014-05-15
Country: US
State: MS
City: Jackson
Postal Code: 39201
Category: Risk Management
Job Type: Regular Full-TimeEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.