Information Security Analyst
FL - Orlando - Loews Hotels & Co
Loews Hotels & Co
Experience Loews Hotels, a luxury hotel brand comprising 26 distinctive, pet-friendly properties across the United States and Canada.We offer hybrid schedule flexibility based out of our office in Orlando, FL.
Who We Are: Loews Hotels & Co is a leading owner and operator of luxury hotels with a portfolio consisting of 25 hotels and resorts in the United States and Canada. Located in major city centers and resort destinations from coast to coast, the Loews portfolio features one-of-a-kind properties that go beyond Four Diamond standards and embrace their “uniquely local” community in order to curate exciting, approachable and local travel experiences for guests.
What We Offer:
This is a bonus eligible position
Competitive health & wellness benefits, 401(k) & company match
Paid Sick Days, Vacation, and Holidays, Paid Bereavement, Paid Pet Bereavement
Training & Development opportunities, career growth
Tuition Reimbursement
Team Member Hotel Rates, other discounts, perks and more
What We’re Looking For:
We're seeking an Information Security Analyst to join our team!
As an Information Security Analyst, you'll be a vital line of defense against ever-evolving cyber threats. You'll leverage your technical expertise and strategic thinking to protect our organization's digital assets. We're looking for someone who thrives in a collaborative environment, fostering a culture of learning and growth within our teams.
Who You Are:
A relationship builder with a dynamic approach to developing connections
A continually curious forward thinker who loves to find creative solutions
A team builder with the ability to establish a strong following
Comfortable with taking the lead in a variety of settings
A collaborator, learner and mentor who excels in an exciting, ever-evolving environment
A sharp minded security professional who thrives on tackling complex problems and possesses a logical, methodological approach to identify, investigate, and resolve information security challenges
A communicator & collaborator who bridges the gap between technical and non-technical audiences by effectively explaining complex security concepts.
A master of prioritization and thrives in fast-paced environments. You excel at juggling multiple tasks, consistently meeting deadlines, and staying ahead of the curve with your proactive approach to security threats and challenges.
What You’ll Do:
Vulnerability Management: Track identified weaknesses in systems and networks through vulnerability assessments and penetration testing and report on remediation progress.
Security Incident Response: Track and report on all remediation efforts that are identified during the response.
Conduct security risk assessments: Identifying vulnerabilities and recommending mitigation strategies. Report on mitigation strategies until fully implemented.
Security Controls Effectiveness reporting: Perform monthly metrics collection and reporting on key security controls
Security Policy and Standards Review: Maintain up-to-date security policies and standards through regular reviews.
Monitor and audit security controls: Verifying their effectiveness and adherence to policies.
Your Experience Includes:
Must be willing and able to travel 3% of the time
Bachelor's degree in a relevant field: Information Security, Computer Science, Cybersecurity, or a related field is preferred. May accept equivalent experience in lieu of a degree.
8-10 years of experience in Information Security, with a strong track record of accomplishment.
Strong understanding of information security principles and best practices: This includes knowledge of security frameworks like NIST, PCI, SOX, and common attack vectors.
In-depth knowledge of PCI DSS requirements: Understanding all six control categories (Build & Maintain a Secure Network, Protect Cardholder Data, maintain a Vulnerability Management Program, Implement Strong Access Control Measures, Regularly Monitor and Test Networks, and Maintain an Information Security Policy) is crucial.
Understanding of network security concepts: Firewalls, network segmentation, access control lists (ACLs), and secure protocols (HTTPS, SSH) are essential.
Scripting skills (Python, Bash): May be required for automating security tasks.
Certified Information Systems Security Professional (CISSP) or GIAC certifications
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Bash CISSP Computer Science Finance Firewalls GIAC Incident response Network security NIST PCI DSS Pentesting Python Risk assessment Scripting SOX SSH Vulnerabilities Vulnerability management
Perks/benefits: 401(k) matching Career development Health care Salary bonus Wellness
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Cybersecurity Analyst jobs
- Open Senior Cybersecurity Engineer jobs
- Open Security Operations Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Information Security Officer jobs
- Open Principal Security Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Product Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Network Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Manager Pentest H/F jobs
- Open Security Consultant jobs
- Open Security Operations Analyst jobs
- Open Information Security Architect jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open Vulnerability management-related jobs
- Open DevOps-related jobs
- Open DoD-related jobs
- Open Malware-related jobs
- Open APIs-related jobs
- Open CEH-related jobs
- Open Security Clearance-related jobs
- Open Security assessment-related jobs
- Open EDR-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open SaaS-related jobs
- Open DevSecOps-related jobs