Data/Business Analyst w/ Vulnerability Remediation - Randstad USA
Charlotte, NC 28262
About the Job
Randstad Digital is hiring and we're looking for someone like YOU to join our team! If you are seeking a new opportunity, looking to grow in your career, or you know someone who is - we want to hear from you! Take a look at the below opportunity, or feel free to visit RandstadUSA.com to view and apply to any of our open roles.
location: Charlotte, North Carolina
job type: Contract
salary: $64.53 - 69.53 per hour
work hours: 8am to 5pm
education: Bachelors
responsibilities:
In this role, you will:
· Serve as an analyst in executing the risk management control for infrastructure vulnerability zero-day rated vulnerabilities.
· Take daily direction from the control lead and overarching direction from the hiring manager.
· Perform advanced data filtering, grouping, and data analysis with Excel data extracts. Knowledge of pivot tables and other data analysis techniques available in Excel is a must.
· Open incident tickets to remediation owners, ensure vulnerabilities are fixed on time, escalate overdue vulnerabilities to another control for escalation, and proactively follow-up and track these highest risk vulnerabilities until they are closed.
· Retain evidence and artifacts demonstrating the quality of execution of this work in support of audit and control reviews and quality assurance assessments.
· Support the timely completion of all risk management reviews with a goal of zero audit findings and a rating of effective on all control execution.
· Collaborate with other team members involved in executing this control in a collaborative teamwork fashion.
· Identify improvements and lead efforts to implement the improvements to control execution and underlying technology and procedures.
· Craft communications and reports which provide transparency into progress and insight into problems or actions needed.
· Develop an understanding of incoming work, identify the affected parties, communicate action needed concisely.
· Work with the remediation owners and their leadership to provide guidance on actions required
· Track deliverables until completed, escalating when deliverables are missed.
· Support the Information Security program in governing vulnerability remediation across the Technology organization.
· Consult with line of business on the consistent implementation of the enterprise information security model and solutions to remediate information security risks
· Ensure that risks to all information assets are being managed in a timely and effective manner to meet the Information Security Program requirements and the current threat landscape
· Ensure information security capabilities are included in all aspects of the company's technology architecture
· Proactively manage the information security risk profile of line of business information assets throughout the lifecycle of the asset
· Pursue the necessary training and stay abreast of regulatory and compliance issues
· Engage with all levels of professionals and managers companywide and serve as an experienced advisor to leadership
Broadly, success is based on on-time delivery of the work, ability to drive resolution of challenges, and proactive escalation and visibility into items at risk or experiencing active issues. To address deliverables, take data from many different sources and assemble it into a coherent package for affected teams to quickly digest the actions needed. Use systems of records to merge, manipulate, analyze, and summarize data for senior leadership decision making.
Required Qualifications:
· 2+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
· 2+ years of advanced Excel data analysis including pivot tables, lookup formulas, data concatenation and splitting, pattern matching, and experience with rapid, thoughtful analysis of large data sets.
Desired Qualifications:
· Extremely robust attention to detail in recognition that this is a heavily audited enterprise risk management control.
· Prior audit or risk management experience.
· Demonstrated experience in governance, policy, compliance, and risk management practices
&mid