Network Security Analyst

Cleveland, OH, United States

Sherwin-Williams

No matter where you are in the world or what surfaces you are painting or coating, Sherwin-Williams provides innovative paint solutions that ensure your success.

View company page

Strategy & Planning
  • Participate in the planning and designing of enterprise security architecture, under the direction of the IT Lead Security Analyst, where appropriate.
  • Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate.
  • Participate in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, under the direction of the IT Security Manager, where appropriate.
  • Develop and communicate policies, procedures, and plans to executive team, staff, partners, customers, and stakeholders regarding technology and industry-specific laws.

Acquisition & Deployment

  • Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.
  • Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
  • Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.

Operational Management

  • Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).
  • Maintain operational configurations of all in-place security solutions as per the established baselines.
  • Monitor all in-place security solutions for efficient and appropriate operations.
  • Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution.
  • Participate in investigations into problematic activity. 
  • Provide on-call support for end users for all in-place security solutions.
  • Collaborate with IT, security, human resources, and legal to ensure full legal compliance of company policies, procedures, forms, notices, and materials.
  • Maintain a strong awareness of legislative changes or amendments to ensure ongoing and future compliance.
  • Advocate company’s compliance policies via regular written and in-person communications. 
  • Ensure that information security measures and equipment adhere to all applicable laws and regulations.

This position is not eligible for sponsorship for work authorization now or in the future, including conversion to H1-B visa.

This position has a hybrid work schedule with three days in the office and the option for working remotely two days.

Incidental Functions
  • Issue user ID's and passwords to new users and monitors system access and use to identify any security violations; analyzes basic security findings and data.
  • Monitor security systems and analyze potential threats and vulnerabilities on networks.
  • Assist in the analysis of network traffic and alerts to assess, prioritize, and differentiate between potential intrusion attempts and false alarms.
  • Assist with other projects as may be required to contribute to efficiency and effectiveness of the work that helps the team succeed.

 

Formal Education & Certification
  • Bachelor’s Degree (or foreign equivalent) or in lieu of a degree, at least 12 years in experience in the field of Information Technology or Business (work experience or a combination of education and work experience in the field of Information Technology or Business)
  • Preferred CISSP, PCNSA, or CCNA
Knowledge & Experience
  • 1+ years IT experience.
  • Experience identifying and implementing solutions to complex business problems.

Experience in the following areas:

Network Security

  • Preferred experience managing firewall devices such as Palo Alto or Cisco
  • Preferred experience managing a cloud firewall proxy such as Zscaler (ZIA)
  • Preferred experience managing a cloud VPN technology such as Zscaler (ZPA)
  • Preferred experience with securing Industrial Control Systems (ICS)
  • Preferred experience working with API’s. 

Personal Attributes

  • Proven analytical and problem-solving abilities.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Good written, oral, and interpersonal communication skills.
  • Ability to conduct research into IT security issues and products as required.
  • Ability to present ideas in business-friendly and user-friendly language.
  • Highly self motivated and directed.
  • Keen attention to detail.
  • Team-oriented and skilled in working within a collaborative environment.
  • Strong commitment to inclusion and diversity
  • 10% travel is required.
  • Work outside the standard office 7.5-hour workday may be required with on-call availability.

Here, we believe there’s not one path to success, we believe in careers that grow with you. Whoever you are or wherever you come from in the world, there’s a place for you at Sherwin-Williams. We provide you with the opportunity to explore your curiosity and drive us forward. Sherwin-Williams values the unique talents and abilities from all backgrounds and characteristics. All qualified individuals are encouraged to apply, including individuals with disabilities and Protected Veterans. We’ll give you the space to share your strengths and we want you show us what you can do. You can innovate, grow and discover in a place where you can thrive and Let Your Colors Show! 
At Sherwin-Williams, part of our mission is to help our employees and their families live healthier, save smarter and feel better. This starts with a wide range of world-class benefits designed for you. From retirement to health care, from total well-being to your daily commute—it matters to us. A general description of benefits offered can be found at http://www.myswbenefits.com/. Click on “Candidates” to view benefit offerings that you may be eligible for if you are hired as a Sherwin-Williams employee.
Compensation decisions are dependent on the facts and circumstances of each case and will impact where actual compensation may fall within the stated wage range. The wage range listed for this role takes into account the wide range of factors considered in making compensation decisions including skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled.
The wage range, other compensation, and benefits information listed is accurate as of the date of this posting. The Company reserves the right to modify this information at any time, with or without notice, subject to applicable law.
Sherwin-Williams is proud to be an Equal Employment Opportunity/Affirmative Action employer committed to an inclusive and diverse workplace. All qualified candidates will receive consideration for employment and will not be discriminated against based on race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, age, pregnancy, genetic information, creed, marital status or any other consideration prohibited by law or by contract.
As a VEVRAA Federal Contractor, Sherwin-Williams requests state and local employment services delivery systems to provide priority referral of Protected Veterans.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: APIs CISSP Cloud Compliance Firewalls ICS Industrial Network security Strategy VPN Vulnerabilities

Perks/benefits: Career development Health care

Region: North America
Country: United States
Job stats:  7  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.