Jobs for People with MS: National MS Society

Mobile National MS Society Logo

Job Information

The University of Chicago Information Security Analyst III - JR25888-3800 in Chicago, Illinois

This job was posted by https://illinoisjoblink.illinois.gov : For more information, please see: https://illinoisjoblink.illinois.gov/jobs/11959145 Department

F&A ITS - Information Security

About the Department

IT Services collaborates with campus partners to support the mission of the University of Chicago through the consistent delivery of high-quality solutions and services.

We provide secure, stable, and reliable infrastructure and applications to support the mission of the University.

We support and enable faculty research and teaching with the effective use of technology.

We simplify the technology experience for faculty, students, alumni, and staff, and we ensure technology is mobile-friendly and accessible.

We identify, manage, and mitigate the technology risks of the University.

Job Summary

Under the general direction of the Director of Information Security, this position is responsible for providing security incident detection and response; assessing threats and mitigating risks; managing and delivering security services and managing support functions needed for security operations. The Information Analyst III role works closely with a team of Information Security Engineers who manage the security infrastructure and provide incident response support.

Responsibilities

  • Responds to security alerts, user inquiries, and service requests. Manages all phases of incident response including preparation, identification, containment, eradication, recovery, and lessons learned. Leads teams responding to incidents and conducting in-depth information technology risk assessments. Provides direct customer service to faculty, students, and staff for security needs. Collaborates with IT partners throughout the institution. Maintains up-to-date knowledge of security threats and proactively identifies measures needed for protection or detection that reduce risk to the institution. This responsibility requires independent critical thinking to meet the needs of the complex and dynamic university environment.
  • Manages security services provided to the University community.Provides service management for security services. Maintains relationships with key customers in support of the University\'s legal, audit, and human resource functions. Contributes to security awareness through presented or published material. Guides communications with users to understand their security needs and supports the implementation of procedures to accommodate them. Ensures that the user community understands and adheres to necessary procedures to maintain security.
  • Assess and improve security operations. Reports and analyzes key security operations metrics. Guides continuous improvement in security services. Makes recommendations and design improvements to IT security procedures. Collaborates with Information Security Engineers to improve detection and response capabilities. Documents processes and procedures. Manages security operation schedules and standup meetings.
  • Uses a deep understanding of IT expertise to develop and implement security and compliance policies, guidelines, and safe practices for university-wide computing and networking systems.
  • Leads teams to conduct in-depth information technology risk assessments; makes recommendations and designs improvements to IT security procedures.
  • Performs other related work as needed.

Minimum Qualifications

Education:

Minimum requirements include a college or university degree in related field.

---

Work Experience:

Minimum requirements include knowledge and skills developed through 5-7 years of work experience in a related job discipline.

---

Certifications:

---

Preferred Qualifications

Experience:

  • Inc dent response or security operations.
  • Customer service in any field.

Certifications:

  • GSEC, CEH, or CISSP.

Technical Skills or Knowledge:

  • Understanding of network and communication technologies including TCP/IP, HTTP, TLS, x.509, and DMARC.
  • Understanding of common threat actor tools, techniques, and procedures.
  • Proficient using the most common operating systems (Windows, Mac, and Linux) including familiarity with the command-line environment for each.
  • Experience with all stages of the incident response process.
  • Analyzing security alerts from network, endpoint, and email security monitoring tools.

Preferred Competencies

  • Excellent communication skills, especially in conveying technical concepts to a non-technical audience.
  • Strong customer service orientation.
  • Diagnose complex technical problems.
  • Work collaboratively and independently.
  • Handle multiple tasks and substantial deadline pressure.

Working Conditions

Office environment.

Handle work outside of normal business hours on a scheduled or emergency basis.

Some t

DirectEmployers