Position Details: Program Governance Analyst - 946138T
Cyber Security Metrics Analyst
Client does more than outfit the world’s best athletes. We are a place to explore potential, obliterate boundaries, and push out the edges of what can be. We’re looking for people who can grow, think, dream and create. We thrive in a culture that embraces diversity and rewards imagination. We seek achievers, leaders and visionaries. At client, it’s about bringing what you have to a challenging and constantly evolving game.
Client Technology brings together technology and process expertise to create value for the consumer. We deliver one-stop, integrated process and technology capabilities that enable client, businesses and brands worldwide. Our focus is on providing Lean solutions that eliminate waste, maximize consumer value, and drive profitable business growth.
As a Cyber Security Metrics Analyst, your role on the Governance team will include leveraging your knowledge of automation, data analysis and visualization to support client’s Information Security Program. You will play a critical role in ensuring that security controls are effectively measured, monitored, and communicated to client’s senior leaders. Your responsibilities will also include:
- Provide analysis and insights into data supporting the effectiveness of technical and process-based cyber security controls.
- Establish automated data pipelines that feed data visualization tools, such as Tableau.
- Liaise with GRC and other CIS and Technology stakeholders to ensure alignment between all groups.
- Develop cloud-based web application which serves as primary method of content dissemination.
- Must take ambiguous high-level language and translate it into real world operations.
- Influence teams to implement a security metrics framework by demonstrating its value and tactfully provide guidance on existing operations to ensure smooth adoption of the framework.
- Ability to socialize and influence others to buy into a process-oriented approach to their work.
- Ability to gain a deep level of technical and process knowledge across multiple security domains in a short amount of time.
- Ability to think both strategically and tactically to enable a better future state while continuing to execute against current milestones.
- Stay current on information security technologies, trends, standards and best practices.
- Ability to obtain a deep level of technical and process knowledge across multiple security domains in a short amount of time.
To make it clear, we're not looking for just anyone. We're looking for someone special, someone who had these experiences and clearly demonstrated these skills:
- Bachelor’s Degree in relevant field and minimum of 3 years relevant experience
- Experience with the setup and maintenance of AWS EC2 instances running Puppet and Elastic Load Balancing
- Experience with databases such as MySQL, SQLite, PostgreSQL and MongoDB
- Experience as a full-stack developer in an enterprise environment
- Experience establishing automated data pipelines and/or measuring security control effectiveness and an enterprise environment.
- Experience working as a BSA/Lead on multiple projects and business functions is a plus.
- Comfortable working with ambiguity is a must.
- Exceptional communication skills, including the ability to gather relevant data and information, actively listen, dialogue freely, verbalize ideas effectively, negotiate tense situations successfully, and manage and resolve conflict.
- Proven presentation and facilitation skills.
- Demonstrated expertise of building a consensus across business partners and technology leaders, and influencing successful outcomes.
- Must excel working in team-oriented roles that rely on ability to collaborate with others.
- Experience working successfully in a highly matrixed work environment.
- Passion for the client brand and for an innovative, Just Do It work environment.
- APPLICATION PERFORMANCE
- DATA LOSS PREVENTION
- DATA PROTECTION
- DIGITAL RIGHTS MANAGEMENT
- INFORMATION SECURITY
- INTERNAL AUDIT
- ISO 27000
- IT AUDIT
- LOSS PREVENTION
- PROBLEM SOLVING
- SECURITY POLICIES
- MICROSOFT EXCEL
- RELATIONSHIP MARKETING
- USE CASES
- VIRTUAL MACHINE