IT Security Analyst Specialist

Phoenix, AZ, United States

Applications have closed

Humanity

Jobs for Humanity paves the way to a fairer future for all by connecting historically underrepresented talent to welcoming employers.

View company page

Company Description

Jobs for Humanity is dedicated to building an inclusive and just employment ecosystem. Therefore, we have dedicated this job posting to individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Ethnic Minority, and the Previously Incarcerated. If you identify with any of the following communities do not hesitate to register, even if you feel that this particular opportunity is not the right fit for you.

Company Name: FIS Global

Job Description

Position Type :

Full time

Type Of Hire :

Experienced (relevant combo of work and education)

Education Desired :

Bachelor of Computer Science

Travel Percentage :

5 - 10%

Job Description

Are you curious, motivated, and forward-thinking? At FIS you’ll have the opportunity to work on some of the most challenging and relevant issues in financial services and technology. Our talented people empower us, and we believe in being part of a team that is open, collaborative, entrepreneurial, passionate and above all fun.

About the team:

As an IT Security Analyst with FIS, your skills will be put to the test on the front lines of cyber-crime. Information security is at the heart of fintech and you’ll help protect and secure highly-sensitive financial data for customers around the world.
 

What you will be doing:

• Implementing information security controls and preventing hackers from infiltrating company information and jeopardizing programs.
• Maintaining and controlling access to security systems and utilizing applicable encryption methods to maintain the company's firewall.
• Working with the user community to understand security needs.
• Proactively handles security vulnerabilities and responds to active threats
 

Duties and responsibilities of the role  :


• Executes security controls to prevent hackers from infiltrating company information or jeopardizing programs.
• Researches attempted efforts to compromise security protocol and recommends solutions.
• Maintains security systems and administers security policies to control access to systems.
• Maintains company firewall and utilizes applicable encryption methods.
• Creates information security documentation related to work area and completes requests in accordance with company requirements.
• Responds to information security-related questions and inquiries using established information security tools and procedures.
• Resolves and/or performs follow through to resolve all information security issues and questions.
• Implements and administers information security controls using software and vendor security systems.

What you bring:


• Knowledge of networks technologies (protocols, design concepts, access control)
• Knowledge of security technologies (encryption, data protection, design, privilege access, etc.)
• Knowledge of network design and engineering
• Proficiency in time management, communications, decision making, presentation and organizational skills
• Proficiency in planning, reporting, establishing goals and objectives, standards, priorities and schedules
• Basic to intermediate decision-making and problem solving skills
• Basic to intermediate verbal and written communication skills to technical and non-technical audiences of various levels in the organization
• Experience establishing and maintaining effective working relationships with employees and/or clients
 

What we offer you:

At FIS, you can learn, grow and make an impact in your career. Our benefits include:
• Flexible and creative work environment
• Diverse and collaborative atmosphere
• Professional and personal development resources
 

.

Privacy Statement

FIS is committed to protecting the privacy and security of all personal information that we process in order to provide services to our clients. For specific information on how FIS protects personal information online, please see the Online Privacy Notice.

EEOC Statement

FIS is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, genetic information, national origin, disability, veteran status, and other protected characteristics. The EEO is the Law poster is available here supplement document available here


For positions located in the US, the following conditions apply. If you are made a conditional offer of employment, you will be required to undergo a drug test. ADA Disclaimer: In developing this job description care was taken to include all competencies needed to successfully perform in this position. However, for Americans with Disabilities Act (ADA) purposes, the essential functions of the job may or may not have been described for purposes of ADA reasonable accommodation. All reasonable accommodation requests will be reviewed and evaluated on a case-by-case basis.

Sourcing Model

Recruitment at FIS works primarily on a direct sourcing model; a relatively small portion of our hiring is through recruitment agencies. FIS does not accept resumes from recruitment agencies which are not on the preferred supplier list and is not responsible for any related fees for resumes submitted to job postings, our employees, or any other part of our company.

#pridepass

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Computer Science Encryption FinTech Firewalls Privacy Vulnerabilities

Perks/benefits: Career development Flex hours

Region: North America
Country: United States
Job stats:  11  2  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.