The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document information security policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.