Search jobs > Honolulu, HI > Information assurance

Information Assurance Analyst - Security Architecture / Vulnerability Management +8992

Hawaiian Electric
Honolulu, Hawaii (HI), US, 96840
Full-time

We recognize our competitive advantage our people. We believe in our people, who share our vision of meeting the needs of our employees, customers, and communities and who carry out the continued success of the company.

Our employees are committed to the company's foundational values : integrity, excellence, teamwork, environmental stewardship, and community commitment.

In turn, we invest in our employees, providing opportunities for challenge and advancement and offering a competitive compensation package.

Posting End Date : at 11 : 59PM HST

BRIEF POSTING DESCRIPTION :

The P EJ INFORMATION ASSURANCE Department of the P INFORMATION ASSURANCE Division at Hawaiian Electric Company has 3 Management vacancies available. (Role : )

JOB FUNCTION (Security Architecture) :

Performs assessments of systems and networks within the network environment or enclave and identifies where those systems / networks deviate from acceptable configurations, policies, or guidance.

Measures effectiveness of defense-in-depth architecture against known vulnerabilities.

  • Assists with risk assessments, and development of security architecture solutions for information technology (IT), operational technology (OT), grid technologies and cloud services.
  • Supports development of detailed plans and requirements for information systems’ security controls and security monitoring solutions.
  • Conducts ongoing compliance reviews; assists in developing practices to ensure adequate information security and IT controls.

JOB FUNCTION (c) :

Performs vulnerability assessments of systems and networks within the network environment or enclave and identifies where those systems / networks deviate from acceptable configurations, policies, or guidance.

Measures effectiveness of defense-in-depth architecture against known vulnerabilities.

  • Assists with risk assessments, and development of security architecture solutions and technologies.
  • Supports development of detailed proposals and plans for new information security systems and controls to enhance or enable new capabilities for network or hosted applications.
  • Conducts ongoing compliance reviews; assists in developing practices to ensure adequate information security and IT controls.

ESSENTIAL FUNCTIONS :

  • Performs information security risk assessments and recommends mitigating controls and solutions for IT and Operations Technology (OT) projects and applications, including proposals for externally hosted applications and new utility technology projects.
  • Assists with the system assessments for conformance with configuration control, policy, and guidance.
  • Assists with program development and management for privacy, e-discovery, security awareness training, digital forensics, vulnerability remediation, and other security and compliance programs.
  • Performs miscellaneous administrative roles such as schedule development, information tracking, updating deliverables and other work assigned.
  • Supports the Company’s business continuity planning, IT disaster recovery planning, cybersecurity incident response planning and team (CS-IMT), with occasional on-call support.
  • Participates in Company emergency response activities as assigned, including any activities required to prepare for such emergency response.

BASIC QUALIFICATIONS :

Knowledge Requirements

  • Computer networking concepts and protocols, and network security methodologies.
  • Risk management processes (e.g., methods for assessing and mitigating risk).
  • Cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • Cyber threats and vulnerabilities.
  • Cryptography and cryptographic key management concepts.
  • Data backup and recovery concepts.
  • Host / network access control mechanisms (e.g., access control list, capabilities list).
  • Network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
  • Traffic flows across the network (e.g., Transmission Control Protocol TCP and Internet Protocol IP , Open System Interconnection Model OSI , Information Technology Infrastructure Library, current version ITIL ).
  • Programming language structures and logic.
  • System and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language / Structured Query Language PL / SQL and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Network attacks and a network attack’s relationship to both threats and vulnerabilities.
  • System administration, network, and operating system hardening techniques.
  • Different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
  • Different cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
  • Different cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.).
  • Network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Specific operational impacts of cybersecurity lapses.
  • Security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
  • Ethical hacking principles and techniques.
  • Penetration testing principles, tools, and techniques.

Skills Requirements

  • Conducting vulnerability scans and recognizing vulnerabilities in security systems.
  • Assessing the robustness of security systems and designs.
  • Detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort).
  • Mimicking threat behaviors.
  • Use of penetration testing tools and techniques.
  • Use of social engineering techniques (e.g., phishing, baiting, tailgating, etc.).
  • Use of network analysis tools to identify vulnerabilities (e.g., fuzzing, nmap, etc.).
  • Reviewing logs to identify evidence of past intrusions.
  • Conducting application vulnerability assessments.
  • Performing impact / risk assessments.
  • Developing insights about the context of an organization’s threat environment.
  • Collaborating with teammates and other employees.
  • Communicating effectively in writing and verbally.

Experience Requirements

Entry Level :

  • 1-3 years of experience in Systems administration, basic cyber analysis / operations, cyber threats, risk management, network management, IT system design, cloud deployment or wireless networking.
  • Associates Degree or equivalent work experience in Computer science, cybersecurity, information technology, software engineering, information systems, computer engineering.
  • Obtain within the first six month of employment one or more of the following Certifications A+ CE, CCNA-Security, CND, Network+ CE, SSCP, CCNA Security, CySA+ (CSA+), GICSP, GSEC, Security+ CE, CND, SSCP (Other certification will be considered).

Intermediate Level :

4-7) years of experience information assurance, incident handling, risk management, vulnerability management and analysis, and assistance programs.

  • Bachelor’s degree (or higher) in computer science, cybersecurity, information technology, software engineering, information systems, computer engineering.
  • One or more of the following Certifications A+ CE, CCNA-Security, CND, Network+ CE, SSCP, CCNA Security, CySA+ (CSA+), GICSP, GSEC, Security+ CE, CND, SSCP (Other certification will be considered).

Role :

Number of Vacancies : 3

Work Schedule : Monday - Friday

Work Hours : 7 : 30 am - 4 : 00 pm

30+ days ago
Related jobs
Promoted
AEP Hawaii
Honolulu, Hawaii

As a Information Assurance Analyst, you will be responsible for developing information security policies and procedures and collaborating with stakeholders to design system security architecture and plans. AEP has been engaged by a Honolulu-based enterprise organization to hire a talented Informatio...

Promoted
Leidos Inc
Honolulu, Hawaii

Leidos currently has an opening on the 'Service Management, Integration and Transport' (SMIT) Contract for a Transport Operations Network Security & Information Assurance Engineer position. We are seeking a skilled Network Security & Information Assurance Engineer proficient in network security appl...

Promoted
Leidos Holding
Honolulu, Hawaii

Leidos currently has an opening on the 'Service Management, Integration and Transport' (SMIT) Contract for a Transport Operations Network Security & Information Assurance Engineer position. We are seeking a skilled Network Security & Information Assurance Engineer proficient in network secur...

Promoted
Leidos
Honolulu, Hawaii

Leidos currently has an opening on the ‘Service Management, Integration and Transport’ (SMIT) Contract for a Transport Operations Network Security & Information Assurance Engineer position. We are seeking a skilled Network Security & Information Assurance Engineer proficient in network security appl...

Promoted
booz allen hamilton
Honolulu, Hawaii

You Have: Experience with Risk Management Framework (RMF), Data Infrastructure, Data Fabric, and Data Mesh Experience in information assurance or cybersecurity Experience using the Microsoft Office suite products, including Excel, PowerPoint, Word, and Visio Experience with reviewing and answering N...

Promoted
Imagine One Technology & Management
Honolulu, Hawaii

Imagine One Technology & Management - Information System Security Specialist. One Information system security certification such as CAP, CISSP (or associate), CISM, GSLC, CISSO, or CompTIA Advanced Security Practitioner (CASP+). Information System Security Specialist. Information System Security...

Valiant Integrated Services
Joint Base Pearl Harbor-Hickam, Hawaii

The handbooks offer readers an operational understanding of a nation's disaster management capability and vulnerability, vital to a comprehensive disaster management knowledge base. Work with a 3-person writing team to research, analyze, and integrate open-source information pertaining to Disaster M...

NavitsPartners
Honolulu, Hawaii

Title: Information Security Analyst. Responsibilities: Monitor, analyze, and respond to security incidents, using threat intelligence to safeguard client networks. Employ tools like Azure ATP and Office 365 ATP for incident management. Support security systems and deliver detailed incident reports. ...

NANA
Halawa, Hawaii

The Security Cooperation Management Information Systems Technician (SCMIST) will utilize information management systems to identify, collect, view, manage, assess, and report Security Cooperation (SC) activities. Possess knowledge and proficiency in using the following systems and tools: Joint Train...

AKIMA
Halawa, Hawaii

The Security Cooperation Management Information Systems Technician (SCMIST) will utilize information management systems to identify, collect, view, manage, assess, and report Security Cooperation (SC) activities. Possess knowledge and proficiency in using the following systems and tools: Joint Train...