RubinBrown
Founded in 1952, RubinBrown LLP is one of the nation’s leading accounting and professional consulting firms. The RubinBrown name and reputation are synonymous with experience, integrity and value. RubinBrown redefines the full-service experience by combining technical and industry expertise with a commitment to personal and high-level relationships.
Responsible for the operations of the firm wide security which accounts for identifying and remediating risks in all firm applications and infrastructure services, establishing and monitoring security controls through policies and procedures, and ensuring the firm meets all state and federal laws for regulatory compliance. Develops a security strategy for integrating security tools into the firm. Reports to IT management on security concerns.
This individual will report to the IT Manager of Operations and Security. This position will develop a security roadmap, program, projects, standards, and policies that address identified risks and business security requirements. They will help guide the implementation of IT security programs, projects and infrastructure changes with metrics for ongoing performance measurements and reporting. In addition, they will manage third party cybersecurity partners and vendors including evaluation, selection, contracts, and relationships.
Major Responsibilities
Proactively stay ahead of industry regarding education, certification, best practices, and tools.
Analyze and audit all areas of IT security including cloud services, disaster recovery, backup/recovery, system access, Active Directory, network, wireless, and change management.
Respond to alerts and dashboards, set up monitoring criteria, troubleshoot warnings, and provide partnership with IT operations on outages to resolve alerts
Implement security controls across networking devices, databases, operating systems, and hardware and software components according to best practices and expert recommendations.
Manage and support information security systems such as virus detection systems, endpoint detection and response, data loss prevention, network anomaly detection, cloud access security brokers, security information event management, and other security systems.
Coordinate project delivery efforts with other teams such as security operations, network operations/infrastructure, and governance & risk management.
Ensure that new designs meet set security standards.
Interpret information security and compliance requirements and develop plans to align company security infrastructure to those requirements.
Assist and help develop policies that encourage secure working areas and protects client data.
Review and develop security-related documents, such as incident reports, proposals, and tactical or strategic initiatives and be able to present them to team members, managers, and partners.
Monitor and manage IT security access for all team members including providing role-based system access, integrating new data log sources and modifying security configuration settings and policies.
Recommend security procedures for helpdesk, systems operations, domains, asset classification systems, system acquisition, system development, system maintenance, access control, program models, or reporting tools.
Monitor and manage all IT systems for unusual behavior and security breaches. Respond to security incidents and report to IT management.
Prepare reports or make presentations on internal investigations, losses, or violations of regulations, policies and procedures.
Communicate security status, updates, and actual or potential problems, using established protocols.
Collect, analyze and provide appropriate security metrics using available security tools and services to determine security needs, security program goals, or program accomplishments.
Requirements
Required Practical Experience / Background / Skills
Strong customer service skills including verbal and written communications.
Superior time management skills including sense of urgency and proactive approach.
Strict adherence to professional ethics.
Ability to work independently and in a team environment.
Ability to work on and successfully complete multiple projects at the same time.
At least 5 years of relevant technology experience in related technical environment preferred.
Required Professional Background / Skills
Bachelor’s degree in Computer Science, Information security, or related degree preferred
5 years of experience in IT risk or information security with Security-based Certifications.
Certified Information Systems Security Professional (CISSP) highly desired, or CompTIA Security+ with seven or more years’ experience.
Minimum five years of progressive security monitoring experience, security operations, and incident response activities; preferably within a professional services firm or similar environment.
Excellent knowledge of security protocols and procedures.
Knowledge of networking and security technologies such as MPLS, VoIP, IPSEC, VPN, routers, switches, firewalls, DLP, IDS/IPS, MFA, SSO, EPP and SIEM devices.
Additional experience preferred includes managed SEIM service, network monitoring, Kali Linux & ACAS (Nessus and related products).
Knowledge of IT security compliancy frameworks such as SOC and SOC2.
Understanding of security logging, audit logging, and event logging.
Experience in conducting, participating in, and evaluating security testing activities e.g., security assessments, audits, and penetration testing.
Experience supporting operational security activities e.g., rewall implementation, risk mitigation, host security, encryption, intrusion detection, and viral detections.
Working Conditions
Typical office hours of 8:00am – 5:00pm.
Able to work in a team environment with senior IT professionals who share knowledge and experience freely.
Must be available for on-call coverage during evenings, weekends, and holidays.
Ability to work extra hours, different hours, or staggered hours as determined by the workload and expectations.
Minimal travel.
Ability to sit for long periods of time.
Ability to move throughout office.
Ability to lift, carry, push, and pull up to 50 pounds.
Colorado Salary Statement:
The salary range displayed is specifically for those potential applicants who will work or reside in the state of Colorado if selected for the role. Any offered salary is determined based on internal equity, internal salary ranges, market data/ranges, applicant skills and prior relevant experience, degrees and certifications (e.g. JD / technology).
Salary Range: CO – IT – Senior Security Analyst
Benefits Summary
Associated topics: attack, information security, information technology security, leak, malicious, security, security analyst, security engineer, security officer, violation