Information Security Analyst

2 - 5 years

4 - 7 Lacs

Posted:1 day ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Software Services helps build First Americans product suite that encompasses the best in class Title Insurance, Settlement and Mortgage solutions platforms. Leverages technology product stack across Microsoft platform predominantly to develop, enhance and maintain the best in class applications. The R & D division delivers solutions for the title insurance industry leveraging the best of NLP, AI and ML.
Job Summary
Information Security Analyst
Insider Risk and Controls (IRC) and User and Entity Behavior Analytics (UEBA)
Job Profile Summary
Responsible for supporting the Information Security awareness program initiatives, including protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
Essential Functions
  • Participates in identifying business process requirements and related business/application solutions for a specific business need.
  • May provide training and support directly to customers.
  • Identifies/receives problem, researches alternatives, prepares presentations, drives solutions, tests to confirm, gains consensus, and implements solutions for defined business processes.
  • Creates documentation of technical security requirements and functions.
  • Generates and creates reports; researches and analyzes data and report trends to management/business partner.
  • Under general supervision, oversees a small to medium scale projects or phases of a larger project.
  • Conducts risk assessments, interviewing internal and external customers, to gain technical knowledge of security/compliance requirements.
  • Provides direct support to information systems development and business community regarding risks associated with new or changing technologies.
  • Keeps abreast of industry advancements and incorporates that knowledge into daily work activities.
  • Participates in evaluation and selection of new technology.
  • Resolves security problems to obtain operations across all platforms including email, files transfer, multimedia, teleconferencing, etc.
  • Required to perform duties outside of normal work hours based on business needs.
  • Reviews and analyzes user activity logs for concerning an/or anomalous activity.

Job Complexities & Impact
  • Works on problems of moderate scope where analysis of situations or data requires a review of a variety of factors
  • Exercises judgment within defined procedures and practices to determine appropriate action
  • Follows department processes and procedures and makes recommendations to these processes
  • Errors may cause significant delay of process development or problem resolution
  • Works independently setting own priorities and objectives. Work is reviewed for soundness of judgment and overall accuracy
  • Ability to establish and maintain effective working relationships within and between departments

Supervision Received or Extended
  • No responsibility for the supervision of others

Knowledge and Skills/Technology Used
  • Prefer working knowledge of UNIX/AIX, Microsoft NT/2000, firewall multi-layer design and implementation, router access list/packet filtering (CISCO), WANs, LANs, the Internet, Intranets, network protocols and network services (i.e., telnet, ftp, etc.), Intrusion detection systems, Virtual Private Network (VPN), two factor authentication
  • Experience in implementing Information Security technologies and/or processes
  • Experience in product evaluation and managing vendor relationships required
  • Experience in defining Information Security strategy and integrating security technologies into corporate frameworks
  • Strong written and verbal communication skills
  • Strong interpersonal skills
  • Self-motivated; self-starter
  • Ability to manage multiple tasks and respond quickly to emergent problems
  • Securonix,Splunk, Defender, Purview, ServiceNow
  • Insider or user behavior experience a plus but not required

Typical Education
  • Generally requires a BS Degree in Computer Science, Information Technology, Telecommunications, or equivalent work experience

Typical Range of Experience
  • Must have 3-5 years of information security experience
  • Must have 2+ years experience with networking, intrusion detection, VPN, PKI, Checkpoint and PIX firewalls, CISCO; NAC; Identity management and encryption technologies

License or Certification
  • CISSP, GIAC, CCNA, CCNP preferred

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now
First American logo
First American

Financial Services / Title Insurance

Santa Ana

RecommendedJobs for You