reports to the Chief Information Officer (CIO), leads the information security team, and has primary responsibility for implementation of the IT security program Key elements of this plan include risk management, vulnerability management, data ownership, security documentation and policies, security training, and incident response The ISO and the information security team advise and instruct other functional teams on infosec concerns related to areas such as change control (change management), software design, network architecture, and other areas where technical controls related to information security are implemented
reports to the Chief Information Officer (CIO), leads the information security team, and has primary responsibility for implementation of the IT security program Key elements of this plan include risk management, vulnerability management, data ownership, security documentation and policies, security training, and incident response The ISO and the information security team advise and instruct other functional teams on infosec concerns related to areas such as change control (change management), software design, network architecture, and other areas where technical controls related to information security are implemented
The Information Security Analyst participates in the identification, tracking, and monitoring of information security threats and service operations The Information Security Analyst provides technical expertise for various Information Security systems including Threat Management, Web Proxy, Vulnerability Management, Endpoint Protection (EDR), Email Security, Security Information and Event Management and Data Leak Prevention Assists in the support of day to day operation of Information Security infrastructure solutions including SIEM, Email Security, Vulnerability Management, Endpoint Protection (EDR), App Scanner, DLP, and Web Security Gateway