Information Security Analyst (Risk) - Tech

Gray MediaAtlanta, GA
3hOnsite

About The Position

The security analyst reviews information from various streams, determines risks, and assists in mitigation efforts. This may include working with end users, IT administrators, vendors, and security providers. This position uses various Governance, Risk, and Compliance tools to determine if the company and vendors are in alignment with industry standard guidelines for safe cyber-related practices. This includes working with divisions, stations, and vendors to gather information and provide guidance to adhere to established standards. Included with this is working with security tools to identify and remediate potential threats to endpoints due to misconfiguration, vulnerabilities, and unsafe operation. Please note - primary job duties and responsibilities include, but are not limited to, the information listed above This position is listed as local to our Atlanta office; however, a qualified candidate residing within fifty miles of Gray Media's owned corporate office, business unit, or television station may be considered.

Requirements

  • solid background in the administration of desktop and server computer systems
  • demonstrable written communication skills

Nice To Haves

  • two years or more, working with an industry-recognized endpoint detection and remediation platform or with GRC and Third-Party Risk Management

Responsibilities

  • reviews information from various streams
  • determines risks
  • assists in mitigation efforts
  • working with end users, IT administrators, vendors, and security providers
  • uses various Governance, Risk, and Compliance tools to determine if the company and vendors are in alignment with industry standard guidelines for safe cyber-related practices
  • working with divisions, stations, and vendors to gather information and provide guidance to adhere to established standards
  • working with security tools to identify and remediate potential threats to endpoints due to misconfiguration, vulnerabilities, and unsafe operation
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service