Security Governance Analyst Information Technology (IT) - Atlanta, GA at Geebo

Security Governance Analyst

Job Title:
Governance Data Analyst Job Location:
Atlanta, GA, United States Job Duration:
12months on w2
Job Description:
- There are four main components to the information Security & Governance team should focus on designing, building and implementing:
Strategy Implementation Operation Monitoring The TechOps Governance Team is the face of the TechOps in leading infrastructure governance with our CIS & domain partners.
Together with our stakeholders we create and implement our client cloud governance policies & standards.
We partner with CIS & TechOps domain owners as they manage and mitigate security incidents, and address solutions to our client s Compliance Audits.
Key activities:
Develop & implement a standard as a consistent reference model Elevate opportunities using data-driven insights Provide oversight and coordination of policies & compliance.
Partner with CIS, TechOps and Domain owners.
Embrace the organization s culture Communicate the business value of the information security spend resources wisely and transparently Ensure compliance reporting & monitoring actions to enforce accountability.
Skills Needed:
- Cloud provider experience & familiarity (AWS & Azure) Experience in implementing reporting tools, visualizations & dashboards Excellent technical writing & documentation skills Experience in influencing governance and policy adoption Great communication skills & team player Preferred:
Familiarity using Jira & Confluence, ServiceNow Experience in technology stack like Scripting & automation (Powershell, Python, etc) Duties:
- Develops action plans and processes, in coordination with management team, for integrating activities and optimizing department resources to meet major goals and objectives.
Facilitates or performs application support, problem solving, and issue resolution with internal and external resources.
Contributes and reviews recommendations for technical solutions.
Manages and/or contributes to the technical components of the RFP process.
Resolves issues and determines options for issue resolution and risk mitigation.
Defines and communicates requirements for technical environments and determines the technical scope for projects.
Provides technical estimates for project budget input to Senior/Project Manager.
Leads and owns engagements with software vendors to ensure that code and configuration requirements and deliverables are met.
Enforces architecture, governance, security, and global process standards to system changes and deployments.
Coordinates compliance issue identification and remediation.
Collaborates with other teams on integration needs/design.
Contributes to database design and creates critical-path, high-risk, advanced technical designs.
Approves proof of concept efforts and reviews results.
Enforce our client and department architectural direction and ensure consistent technical approach within department.
Decide on engineering tools based on recommendations.
Allocate resources based on performance monitoring and tuning results.
Manage and enforce performance thresholds and standards.
Review and approve performance test results, recommendations, and tuning results.
Oversee and is responsible for the creation of test plans, test execution, and validation of test results.
Skills:
Typical Office:
This is a typical office job, with no special physical requirements or unusual work environment.
Recommended Skills Amazon Web Services Architecture Auditing Automation Coaching And Mentoring Communication Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.