[Close] 

Cybersecurity Analyst

Are you looking to make a difference in your career? We're working on smarter grids, cleaner energy and tools to help people manage energy more efficiently.
About IT
The role of IT goes beyond the traditional Information Technology "service provider." Many of the innovative ideas and projects that shape the company's future and move SCE forward are dependent on technology. IT employees are at the heart of these projects, collaborating, designing and executing technology solutions that are transforming our industry.
Position overviewThe Cybersecurity Analyst on the Risk Assessment team will evaluate new and existing technologies, systems, and processes to ensure they meet the organization's Cybersecurity and information security standards and industry practices. He /she will assess, develop and communicate information security requirements for technology. He/she will utilize his/her solid understanding of cybersecurity related risk, regulatory, and audit requirements to perform the essential duties and responsibilities of this position.
Responsibilities may include
Conduct independent reviews of infrastructure security, data security and access requests to determine if requests are appropriate; as part of this analysis, conducts assessments of threats and vulnerabilities, determines deviations from standards or policies, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational environments. Conduct Process reviews; identify and implement process improvements.
Conduct independent reviews of hardware /software products supporting IT Services and vendors providing IT Services to determine if selections are appropriate; as part of this analysis, conducts assessments of threats and vulnerabilities, identify deviations from standards or policies, assesses the level of risk. Develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational environments.
Provide formal input and analysis into Cybersecurity policy /standards exception requests, including formal documentation of position and related risk assessment.
Collaborate with project teams, Audits, Law and Supply Chain Management, OUs, and throughout IT (architects, developers, systems operations personnel) to (a.) ensure policy/standards needs are addressed, and (b.) to train and educate key end user groups of the pertinent policies and standards that apply to them. Develop appropriate and effective reports to various audiences (operations teams, leadership, etc) to effectively communicate policy/standards gaps and to support effective mitigation efforts.
Analyze trends and themes in exception requests submitted and recommend procedure, policy or standards changes to address underlying issues identified.



Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

cybersecurity Engineer
El Segundo, CA Engility Corporation
Order Management Analyst
Monterey, CA C.H. Robinson Worldwide, Inc.
Supply Chain, Operations Analyst
San Jose, CA Maxim Integrated Products
Senior Supply Chain Analyst
Buena Park, CA Orora
Supply Planning Analyst
Napa, CA Treasurey Wine Estates