Best People + Right Culture. These are the driving forces behind JE Dunn's success. By hiringinspired people, giving theminteresting and challenging work, enabling them withinnovative tools, and letting themshare in the company's rewards, we've found asustainable way to growin our industry for the last 100+ years. Our diverse teams around the country strive to enrich lives through inspired people and places everyday, andwe need inspired people like youto join us in our pursuit of building perfection.
Role Summary
The Security Analyst 1 will monitor and maintain various security systems as part of a growing Information Security team. This position will be responsible for security operations monitoring, remediation and training end users on up-to-date security procedures. All activities will be performed in support of the strategy, vision and values of JE Dunn.
- Autonomy & Decision-Making: Makes decisions on routine matters, provides recommendations to supervisor and refers all exceptions to supervisor.
- Career Path: Security Analyst 2
Key Role Responsibilities - Core
SECURITY OPERATIONS FAMILY - CORE
- Analyzes security logs to identify threat events; triage and respond accordingly to security incidents following internal security protocols
- Continuously review alerts from SIEM, endpoint detection, firewalls, and other security tools to identify potential security incidents
- Observe telemetry from security systems and proactively research potential threats and risks
- Acts as first line of support for triage and remediation of support tickets related to security and tracks ongoing support issues
- Escalate confirmed or complex security incidents to Tier 2 or higher-level analysts with comprehensive documentation and context
- Maintains confidentiality and integrity in dealing with sensitive information systems and processes
- Responsible for asset management of enterprise security inventory, excluding end user devices
- Tests network security controls; coordinating remediation efforts and closure of any identified issues
- Configures security controls in multiple protection systems and IT infrastructure in accordance with policy, standards, and procedures
- Assist in configuring and fine-tuning security monitoring systems to reduce false positives and improve detection accuracy
- Help identify and report vulnerabilities by reviewing scan results and assisting with remediation tracking
- Works with various internal teams to test, discover and resolve vulnerabilities
- Maintain third-party risk management questionnaires, standards, processes, and documentation; in alignment with client, regulatory, and enterprise obligations
- Stays current with IT security trends and standards through local special interest group involvement and monitoring online information sources
- Stays current with released security features of internal IT systems and software
- Continuously update knowledge on the latest cyber threats, attack methods, and security technologies, including advancements in AI
- Utilize authorized AI-driven platforms and automation to enhance alert triage, enrich incident data, and prioritize threats effectively
Key Role Responsibilities - Additional Core
Knowledge, Skills & Abilities
- Ability to perform work accurately and completely, and in a timely manner
- Communication skills, verbal and written - Intermediate
- Strong self-motivation; willing to learn and research skill set in line with business objectives
- Ability to utilize internet resources for research and problem solving
- Maintains technical writing and documentation discipline
- Ability to follow-up on inquiries in a timely manner
- Ability to solve technical issues - Intermediate
- Adapts to change, is open to new ideas, takes on new responsibilities, handles pressure and adjusts plans to meet changing needs
- Manages difficult or emotional customer situations promptly and efficiently
- Listening skills
- Organizational skills
- Ability to quickly and effectively solve complex problems
- Ability to deliver quality through attention to detail
- Ability to work in team and independently
- Ability to work a flexible schedule - might be on call in the evenings and weekends
- Ability to build relationships with team members that transcend a project
Education
- Bachelor's degree in information security or related field (Preferred)
- In lieu of the above requirements, equivalent relevant experience will be considered.
Experience
- 0-2 years' experience in information security or information technology operations (Preferred)
Working Environment
- Must be able to lift up to 25 pounds
- May require periods of overnight travel
- Normal office environment
- Frequent activity: Sitting, Viewing Computer Screen
- Occasional activity: Standing, Walking, Bending, Climbing, Reaching above Shoulder, Pushing, Pulling
Benefits Information
The benefits package aligned to this position is Professional Non-Union. Please click the link below for more details.
Click here for benefits details. JE Dunn Construction is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer and it is our policy to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. JE Dunn Construction is a background screening, drug-free workplace. JE Dunn provides reasonable accommodations to qualified individuals with disabilities. If you would like to request a reasonable accommodation in order to apply for a job, please submit your request toaccommodations@jedunn.com JE Dunn Construction Company does not accept unsolicited resumes from search firms or agencies. Any resume submitted to any employee of JE Dunn Construction without a prior written search agreement will be considered unsolicited and the property of JE Dunn Construction Company. Please, no phone calls or emails.
|