W2 Role || Security Analyst || Must be local to WI
Job Knowledge, Skills & Abilities: • Knowledge of current DOC hardware and software architecture. • Knowledge of network concepts. • Knowledge of Windows network environments. • Advanced knowledge of Active Directory and group privileges. • Knowledge of all State and DOC security standards, policies and procedures. • Experience working with security issues in a distributed computing environment. • Knowledge of network operating system security issues. • Knowledge and demonstrated work experience with internet / intranet application security issues (e.g. LDAP). • Advanced problem-solving skills and the ability to make independent judgment decisions or contact appropriate parties to assist. • Effective oral and written communication skills. • Knowledge of effective people communication skills. • Knowledge of project planning. • Knowledge of products and applications, in order to create effective security roles. • Ability to multi-task. • Ability to expedite issues in a timely manner. • Customer focused, yet firm enough to ensure strict compliance to DOC security policies and procedures. • Knowledge and demonstrated work experience with security techniques, tools and security infrastructure. • Ability to communicate clearly and effectively to both technical peers and less technical customers in person and via written media such as e-mail, reports and project charters. Preferred Skills and 4-7 years of experience in the following: • Coordination of the account provisioning, de-provisioning, projects and maintenance for DOC platforms and applications. • Utilize security rules to grant / revoke access to applications, servers, group folders, etc. • Coordinate activities within the account management staff to provide timely response to customer requests. • Create and maintain security rules, ensuring that they enforce security standards and policies. Nice to have Skills: • Monitoring, auditing and analysis of security systems. • Provide advice to management on implementing and monitoring Security systems. • Provide advice to BTM in the design and implementation of policies and procedures to provide an acceptable level of Security systems. • Identify threats or serious issues regarding user access that may be caused by added new software and systems. Apply tot his job