A leading source of information about risk, Verisk Insurance Solutions and ISO provide data, analytics, and decision-support services to professionals in many fields, including insurance, finance, real estate, health services, government, human resources, and risk management. Using advanced technologies to collect, analyze, develop, and deliver information, Verisk helps customers evaluate and manage risk. The company draws on vast expertise in actuarial science, insurance coverages, fire protection, fraud prevention, catastrophe and weather risk, predictive modeling, data management, economic forecasting, social and technological trends, and many other fields. To meet the needs of diverse clients, Verisk employs an experienced staff of business and technical specialists, analysts, and certified professionals. In the United States and around the world, Verisk helps customers protect people, property, and financial assets. For more information, please visit our website www.verisk.com .
We offer a competitive salary, a solid benefits package that includes medical, dental, life insurance, and 401(k). Verisk is an equal opportunity employer. Employment is contingent upon successful completion of background investigation.
The Information Security Analyst is responsible for maintaining, improving, and monitoring the computer security environment. The incumbent coordinates complicity with the company’s security philosophy in the development and implementation of software systems and applications. The incumbent will coordinate projects, plan and implement security architecture, communicate security concepts, policies, procedures, standards and administrative practices to the project team for ongoing support of the system while maintaining an open mind and appreciation of the larger context in which the project operates. Assignments are independently planned with approval required. Assignments are normally complex and difficult.
Encryption & Auditing: Possesses sufficient fundamental proficiency to successfully demonstrate the skill in practical applications of moderate difficulty.
Security Best Practices: Demonstrates mastery of the best practices in practical applications of a difficult nature. Recommends improvements to best practices in area of specialty.
Security Monitoring & Auditing: Demonstrates knowledge of what security metrics are available, understands their meaning, and can produce sophisticated reports.
Security Systems & Concepts: Has detailed knowledge of the functionality of security systems and understands how they work and interface with data, applications and systems.
Security Systems Maintenance: Demonstrates mastery of security systems maintenance and enhancement tasks independently.
Security Threat Monitoring: Demonstrates mastery of the skill in practical applications of a difficult nature.
Security Tools & Products: Demonstrates a thorough understanding of the effective use of the tool in complex applications. Experienced in all core features of the tool.
Security Troubleshooting: Demonstrates the ability to identify, locate, isolate, and resolve complex problems relating to information security and related areas.
Client Service: Interact with end user management on all aspects of projects. Work with senior management on planning, strategy, and development of systems. Develop partnership with business units to identify business issues and develop solutions.
Creativity: Actively seeks opportunities to develop new approaches to meet new goals. Grasps and applies advanced concepts. Stays abreast of new tools, technologies, and techniques, and implements them as solutions to business and technical problems.
Insurance Industry Knowledge: Use in-depth knowledge of the Insurance Industry and customer business operations to support ISO’s business units development of new products and enhancement of existing products.
Four to six years experience in computer O/S or network security technology required. Thorough knowledge of the following security technologies required: NT 4.0, NT Windows 2000, CA-ACF2, RACF, CICSO firewall, MS Outlook, a DBMS. One or more years programming experience required; preferably in Assembler, REXX, VB or SLQ.
High School and technical school training with computer security experience or equivalent college degree or equivalent work experience desirable.
Oral Communications: Communicate with users, staff, and top management to ensure mutual understanding of project requirements. Sometimes delivers presentations to users and management on systems design.
Written Communication: Inform associates about critical technical and business ideas through effective memos and other written materials. Provide clear and unambiguous written instructions to staff and team members.