Information Security Analyst V
Federal Reserve Bank of Kansas City - Kansas City, MO

This job posting is no longer available on Federal Reserve Bank of Kansas City. Find similar jobs: Information Security Analyst jobs

-

228851

Federal Reserve Bank of Kansas City

Primary Location

MO-Kansas City

Full-time / Part-time

Full-time

Employee Status

Regular

Overtime Status

Exempt

Job Type

Experienced

Travel

No

Shift

Day Job

Job Sensitivity

Tier II - No Credit Check

Job Summary

Performs daily functions required to maintain the rules and controls for information security to protect the information assets of the Retail Payments Office and Check Processing Platforms. Works with critical and sensitive information on a daily basis and is relied upon to maintain intended security safeguards.

Key Activities

  • Provides information security technical support for Business Line and System information technology assets.
  • Administers the day-to-day activities of information security to ensure communication of time-critical information, to maintain consistent customer service levels, and to maintain the security posture of the RPO’s IT assets.
  • Reviews work processes to identify, design, and implement improvements in information security procedures for improved efficiency and security.
  • Develops, maintains, and implements department standard operating policies and procedures.
  • Participates on project and information security workgroups at the RPO business line level as well as system level projects requiring RPO Security participation.
  • Develops and maintains a working knowledge of the business functions of the RPO business line in order to recommend improved security enhancements and interpret and address security requests and concerns.
  • Provides guidance and training to less experienced staff.
  • Leads and directs staff in the review of security controls to ensure proper safeguards are in place.
  • Makes presentations on project related work to Bank management and staff.
  • Works individually and in a team environment.
  • Multitasks and uses time efficiently to meet project deadlines.
  • Maintains confidential information and demonstrates tact and diplomacy.
  • Performs other duties as assigned.
4. Key Function Activities

Administration

  • Works independently and through others to complete the following activities:
  • Assists with new employee security awareness training.
  • Responds to incoming incidents and provides support to customers to resolve security related issues and problems related to accessing systems managed by the RPO.
  • Reviews and processes access controls and access modification requests to operating systems, database management systems, and applications to prevent unauthorized access to data and to maintain proper security levels.
Technician

  • Works independently to complete the following activities:
  • Analyzes, documents, and communicates risk using the FRS risk management process and SAFR (Security Assurance for the Federal Reserve).
  • Responds to information security events by researching the symptoms of the event and working with all parties involved to determine the priority, cause, and resolution for the event.
  • Tests, implements, and administers new information security systems utilized by the RPO that are provided by System workgroups and Enterprise IS Architects.
  • Documents and communicates information security events to peers, management, other IT areas, and customers to ensure all parties are aware of risk level and the impact on the overall information security posture of the RPO business line.
Specialist

  • Works under general supervision to complete the following activities:
  • Provides project management services and Information Security guidance for RPO projects requiring information security analysts
  • Oversees all risk management processes and acts as liaison to RPO business unit for risk management processes.
  • Promotes, enhances, and maintains RPO-wide information security awareness programs that contribute to System Security programs.
  • Prepares periodic information security articles for Intranet and System newsletters.
Architect

Works under general supervision to complete the following activities:

  • Designs the information security architecture for technology-based business solutions by applying industry best or System standard architectural practices.
  • Influences, establishes, and prioritizes the direction of RPO IT initiatives to provide the necessary information security infrastructure to achieve customer initiatives. Negotiates resolution to issues to align with business requirements.
  • Researches and develops information security solutions based on emerging technologies to support information security needs and requirements.
  • Reviews information security metric reports and provides recommendations on strategic direction based on report data.
Qualifications

General Requirements

  • Three to six years of information security experience with a strong understanding of distributed systems, networking and UNIX operating systems, database management systems, and applications.
  • Systems Security Certified Practitioner (SSCP) or similar certification(s). Certified Information Systems Security Professional (CISSP) certification preferred.
  • Minimum High school level command of spelling, grammar and math, and/or basic vocational training.
  • Bachelor’s degree from an accredited college or university with specialization in an information technology field or equivalent combination of experience, education, and/or certification preferred.
  • Strong interpersonal, analytical and customer service skills, including the ability to explain complex procedures in writing and verbally.
  • General understanding of programs including, but not limited to, Microsoft Office, Internet, and e-mail programs.
  • Ability to provide on call support.
6. Key Function Requirements

Administration

  • Strong understanding of access control methods including access control lists, encryption key management, and user and group administration.
  • General understanding of new and emerging technologies.
  • General understanding of industry and FRS compliance regulations.
  • Strong project management skills.
Technician

  • Strong understanding of access control methods including access control lists, encryption key management, and user and group administration.
  • Strong understanding of computer forensics analysis and laws pertaining to computer forensics.
  • Strong understanding of various types of intrusion detection systems.
  • Strong understanding of various firewall technologies.
  • Strong understanding of vulnerability assessment and vulnerability management methodologies.
  • Strong understanding of new and emerging technologies.
  • Strong understanding of industry and FRS compliance regulations.
  • General project management skills.
Specialist

  • Strong understanding of access control methods including access control lists, encryption key management, and user and group administration.
  • General understanding of new and emerging technologies.
  • General understanding of industry and FRS compliance regulations.
  • Strong project management skills.
Architect

  • Strong understanding of access control methods including access control lists, encryption key management, and user and group administration.
  • Strong understanding of computer forensics analysis and laws pertaining to computer forensics.
  • Strong understanding of various types of intrusion detection systems.
  • Strong understanding of various firewall technologies.
  • Strong understanding of vulnerability assessment and vulnerability management methodologies.

Federal Reserve Bank of Kansas City - 24 months ago - save job - block
Recommended Jobs
Security Administrator
Assurant - Kansas City, MO
Assurant - 6 days ago

Sr. SAP Security Analyst - Hallmark, Kansas C...
Hallmark - Kansas City, MO
Hallmark - 17 days ago

Information Security Analyst
ALTEK - Lenexa, KS
ALTEK - 6 days ago
Easily apply
About this company
209 reviews
The Federal Reserve Bank of New York works within the Federal Reserve System and with other public and private sector institutions to foster...