Browse by first letter of the job description
Please help us to keep this site free by liking us on Facebook. Click on the Facebook logo and click `like`-thanks
"The database of free job descriptions"
"I couldn`t put it down from start to finish...Some of these stories are fascinating, some sad and some just downright funny. I thoroughly recommended it anyone whether interested in Human Resources or not!"
"A really funny and interesting read .... great insight into the wierd and wonderful world of HR ..."
"Amusing and informative. A recommended read for anyone interested in a career in Human Resources. "
"Entertaining reading and one that anyone in the field of HR will be vale to instantly relate too! "
If you want an HR text book this book is probably not for you. If you want a unique insight into some of the weird and wonderful true stories that happened during a twenty year career in Human Resources it is.
free-job-descriptions.com provides a free database of job descriptions. Whether you are writing a job description, need to better understand a job, or are thinking abut your career, free-job-descriptions.com is for you
The IT Security Analyst provides direct support to the IT Security Manager. The role monitors all types of access to protect the confidentiality and integrity of customer and employee data and ensures compliance with organisation policies and standards
IT Security Analyst
IT Information Security
Ensure compliance with all agreed IT policies
Audit IT systems to ensure administrator and user access levels are compliant with policy.
Work with 3rd party service providers to ensure externally hosted or developed systems are built to comply with IT Security Policies, Government Legislation and Regulatory Requirements
Coordinate Penetration Testing to an agreed schedule
Provide input to audit log requirements/design and periodically check audit logs are being maintained to agreed retention levels Test system security in line with pre-agreed ethical hacking procedures
Ensure that systems access is revoked as appropriate (e.g. when user leaves company or transfers)
Manage 3rd Party Attaching process, validating appropriate and explicit levels of access to appropriate systems Working with provider of Security Event Monitoring, review security events and manage any resulting investigation and implementation of remedial action
Manage physical access to secure areas (e.g. Data Centres)
Working with IT Security & Governance team, contribute input into development of new security policies
Using security best practice, identify missing or outdated policies and procedures and work with IT Security & Governance team to add to our agreed standards
Advise the organisation on current information security technologies and related regulatory issues
Ensure analysis, coordination and publication of appropriate reports on all aspects of IT Security,
Assist with maintenance of a formal register of IT Risks
Interface with internal and external Auditors and provide support where required
Provide information to auditors and the IT Security Manager as required Lead remediation activities for all security related audit actions to agreed timescale Disaster Recovery / Service Continuity
Work with IT Applications Manager to ensure any DR plans do not create risk to Systems or infrastructure
Working with Service Managers and Risk and Insurance to ensure DR plans are tested without risk to Systems or infrastructure
Participate in IT Service Continuity Management initiatives to ensure all Systems and infrastructure remain secure during a DR scenario or to ensure any temporary solution invoked to maintain Service Continuity retains an acceptable level of security
Working with various IT Teams and Departments on confidential investigations
Ensuring information remains confidential at all times
Researching information at all levels within the business
Working with internal and external Lawyers to provide information as required
Meeting tight deadlines to deliver information required at short notice
Investigating lost and stolen IT equipment to minimise loss of confidential information
Advanced core skills including Mathematics and English Language to GCSE or equivalent.
Expert level knowledge of IT Security best practices
Expert level knowledge of IT Service Continuity Management best practices including ITIL standards
Broad infrastructure and technology background including proven background in security management In-depth Active Directory Knowledge
In-depth knowledge of TCP/IP based networks (both LAN & WAN) Experience working in a similar role in a comparable organisation In-depth experience of working with security monitoring tools and methods
In-depth experience of managing recovery from an incident or major disaster In-depth experience of PCI DSS framework and associated regulatory requirements
In-depth experience of DPA requirements · CISSP and/or CISA certification would be desirable but not essential
Basic knowledge of Computer Forensic tools and procedures