Checking job availability...
Original
Simplified
CW-Cyber Security Analyst II
The Information Security Analyst participates in the development, communication, implementation, enforcement and monitoring of security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure or destruction. Under general supervision, this job is responsible for performing tests and monitoring security controls that prevent IT-based crime, hacking, intentional or inadvertent modification, disclosure, or destruction of the organization's information systems and IT assets.
Key Responsibilities and Duties
Career Level
6IC
We are an Equal Opportunity Employer. TIAA does not discriminate against any candidate or employee on the basis of age, race, color, national origin, sex, religion, veteran status, disability, sexual orientation, gender identity, or any other legally protected status.
Read more about your rights and view government notices .
The Information Security Analyst participates in the development, communication, implementation, enforcement and monitoring of security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure or destruction. Under general supervision, this job is responsible for performing tests and monitoring security controls that prevent IT-based crime, hacking, intentional or inadvertent modification, disclosure, or destruction of the organization's information systems and IT assets.
Key Responsibilities and Duties
- Designs, tests and implements secure operating systems, networks and databases for the organization.
- Performs difficult risk assessments and executes tests of data processing system to ensure functioning of data processing activities and security measures.
- Conducts auditing of passwords, network based and Web application based vulnerability scanning, virus management and intrusion detection.
- Conducts risk audits and assessments and provides recommendations for application design.
- Analyzes system access logs, ensuring only permitted individuals have access to company information.
- Monitors use of data files and regulates access to safeguard information in computer files.
- Monitors current reports of computer viruses to determine when to update virus protection systems.
- Reviews violations of computer security procedures and alerts managers of issues that arise.
- University (Degree) Preferred
- 2+ Years Required; 3+ Years Preferred
- Physical Requirements: Sedentary Work
Career Level
6IC
We are an Equal Opportunity Employer. TIAA does not discriminate against any candidate or employee on the basis of age, race, color, national origin, sex, religion, veteran status, disability, sexual orientation, gender identity, or any other legally protected status.
Read more about your rights and view government notices .
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job CW-Cyber Security Analyst II
The Information Security Analyst participates in the development, communication, implementation, enforcement and monitoring of security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure or destruction. Under general supervision, this job is responsible for performing tests and monitoring security controls that prevent IT-based crime, hacking, intentional or inadvertent modification, disclosure, or destruction of the organization's information systems and IT assets.
Key Responsibilities and Duties
Career Level
6IC
We are an Equal Opportunity Employer. TIAA does not discriminate against any candidate or employee on the basis of age, race, color, national origin, sex, religion, veteran status, disability, sexual orientation, gender identity, or any other legally protected status.
Read more about your rights and view government notices .
The Information Security Analyst participates in the development, communication, implementation, enforcement and monitoring of security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure or destruction. Under general supervision, this job is responsible for performing tests and monitoring security controls that prevent IT-based crime, hacking, intentional or inadvertent modification, disclosure, or destruction of the organization's information systems and IT assets.
Key Responsibilities and Duties
- Designs, tests and implements secure operating systems, networks and databases for the organization.
- Performs difficult risk assessments and executes tests of data processing system to ensure functioning of data processing activities and security measures.
- Conducts auditing of passwords, network based and Web application based vulnerability scanning, virus management and intrusion detection.
- Conducts risk audits and assessments and provides recommendations for application design.
- Analyzes system access logs, ensuring only permitted individuals have access to company information.
- Monitors use of data files and regulates access to safeguard information in computer files.
- Monitors current reports of computer viruses to determine when to update virus protection systems.
- Reviews violations of computer security procedures and alerts managers of issues that arise.
- University (Degree) Preferred
- 2+ Years Required; 3+ Years Preferred
- Physical Requirements: Sedentary Work
Career Level
6IC
We are an Equal Opportunity Employer. TIAA does not discriminate against any candidate or employee on the basis of age, race, color, national origin, sex, religion, veteran status, disability, sexual orientation, gender identity, or any other legally protected status.
Read more about your rights and view government notices .
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job