So going to have an interview within the next couple weeks (just had a phone interview with IT Supervisor and he is going send me a couple dates that work for him for an in person interview) and wondering what type of questions you guys think they might ask... Here is the job description:
Job Title: IT Systems Security Analyst
Job Summary:
Performs procedures necessary to manage systems security and account permissions to protect information security systems across the enterprise. Validates information security procedures are updated and followed. Audits and grants account permissions to network resources and applications. Performs network scans and reviews security logs and controls. Facilitates the remediation of vulnerabilities, documents and tracks information security issues or incidents. Assists with security assessments based on the direction of the IT Systems Security Supervisor. Administers and monitors data backups and archives.
Job Duties:
- Performs IT access control administration of user/network provisioning, de-provisioning and user permissions. Access control includes Active Directory and other systems account management, Email, group management, share/file permissions and access control management of services associated with internet and remote access. Performs regular audits of access control and provides reports as requested. Administers and documents standards and procedures associated with access control administration. Performs processes required to maintain system account permissions for organizational job roles.
- Reviews security controls for new systems being deployed/implemented. Reviews and documents disaster recovery events and validates tests are conducted periodically, properly documented and plans are in place. Performs routine network scans and reviews security logs for traffic patterns and system anomalies. Coordinates remediation’s of detected vulnerabilities. Reviews the latest news and research to contribute to the organizations information security strategy.
- Provides support for security assessments. Support includes reviewing activities for compliance with documented standards, assessing system configurations and gathering system artifacts for review. Monitors information security documentation for updates per scheduled requirements.
- Ensures data/media recovery by setting up and implementing a regular schedule of system backups and database archive operations. Monitors backup status.