IT Security Analyst
Typical Day in Role:
• Plan and execute all aspects of the clients global and targeted phishing testing campaigns; including developing strategy, recommending enhancements and managing set-up, launch, reporting, communications and technical troubleshooting
• Manage all aspects of cybersecurity awareness data analytics; including managing phishing results dashboard within PowerBI, analyzing interdepartmental data trends, and creating ad hoq reports and dashboards for regional CISOs and Senior Executives
• Develop strategies to remediate phishing risk scores; includes developing and managing phishing remedial training initiatives and programs
• Develop new and update existing Cybersecurity Awareness materials to enhance the client’s cybersecurity culture; educate everyone from the Front line workers and customers via video series, presentations, web sites, mandatory training courses including targeted security training by role, screen savers, phishing tests, etc.
• Develop frameworks to effectively measure global cybersecurity awareness initiatives
Candidate Requirements/Must-Have skills:
1. 5+ years of Cybersecurity & Information Security working experience
2. 3-5 years of Phishing/vishing platform management experience
3. 3-5 years data analytics, database management and data visualization experience
4. Advanced Microsoft Suite knowledge (Excel, Word, PPT, MS Projects, SharePoint, Office 365)
5. Demonstrated project/program management skills, including planning, executing, and monitoring
Nice-To-Have Skills:
• CISSP certification
• PowerBI experience
• Webcast management experience
• Content Management System (CSM) experience; specifically developing pages and updating content
• Bilingual in Spanish or French
Soft Skills:
• Excellent written, presentation, and verbal communication skills to be able to work well with technical peers and business stakeholders at different levels within the organization
• Strong decision making, forward thinking and creative problem-solving skills to anticipate and respond quickly to technological/market influences
• Ability to work as part of a team, as well as work independently or with minimal direction
Education:
• Post-secondary degree in a technical field such as computer science, computer engineering or related IT field required
• Accreditations for Cybersecurity, Information Security or Project Management