The Network Security Senior Analyst will contribute to the maintaining and monitoring of data flows and threats both in and out of the company’s network infrastructure. The Senior Analyst will also build relationships with both Business Units and Peers within IT and Cybersecurity and act as a mentor to junior members of the team. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments. The Network Security Senior Analyst is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals. As a senior security analyst, the expectation is to support leadership with driving vision and strategy.
Strategy & Planning
- Participate in the planning and design of enterprise security architecture, under the direction of the IT Lead Security Analyst, where appropriate.
- Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate.
- Participate in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Program, under the direction of the IT Security Manager, where appropriate.
- Develop and communicate policies, procedures, and plans to executive team, staff, partners, customers, and stakeholders regarding technology and industry-specific laws.
Acquisition & Deployment
- Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.
- Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
- Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.
Operational Management
- Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).
- Maintain operational configurations of all in-place security solutions as per the established baselines.
- Monitor all in-place security solutions for efficient and appropriate operations.
- Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution.
- Participate in investigations into problematic activity.
- Participate in the design and execution of vulnerability assessments, penetration tests and security audits.
- Provide on-call support for end users for all in-place security solutions.
- Collaborate with IT, security, human resources, and legal to ensure full legal compliance of company policies, procedures, forms, notices, and materials.
- Maintain a strong awareness of legislative changes or amendments to ensure ongoing and future compliance.
- Advocate company’s compliance policies via regular written and in-person communications.
- Ensure that information security measures and equipment adhere to all applicable laws and regulations.
- Participate in investigations to resolution and tracks solutions.
- Assist in development and implementation of technical security policies.
- Assist with the development of new computer and network security systems, including both hardware and software.
- Assist in the analysis of network traffic and alerts to assess, prioritize, and differentiate between potential intrusion attempts and false alarms.
- Assist with other projects as may be required to contribute to efficiency and effectiveness of the work that helps the team succeed.
- Participate in hiring activities and fulfilling affirmative action obligations and ensuring compliance with the equal employee opportunity policy.
This position is not eligible for sponsorship for work authorization now or in the future, including conversion to H1-B visa.
This position has a hybrid work schedule with three days in the office and the option for working remotely two days.
Formal Education & CertificationBachelor’s Degree (or foreign equivalent) or in lieu of a degree, at least 12 years in experience in the field of Information Technology or Business (work experience or a combination of education and work experience in the field of Information Technology or Business)
Preferred CISSP, GIAC, or CompTIA Security+
Knowledge & Experience- 5+ years IT experience.
- Proven experience in planning, organizing, and developing IT security and facility security system technologies.
- Experience identifying and implementing solutions to complex business problems.
- Experience in one or more of the following areas
- Network Security
- Experience managing Palo Alto firewalls.
- Working knowledge with Intrusion Prevention System (IPS)
- Preferred Experience with cloud web proxy technology Zscaler (ZIA)
- Preferred Experience with cloud VPN technology Zscaler (ZPA)
- Preferred experience with Palo Alto cloud security controls for SaaS IaaS and PaaS in Azure.
- Working Knowledge of Public Key Infrastructure (PKI) and certificate management
- Experience with network traffic analysis (Wireshark, Scrutinizer, etc)
- Preferred experience with Security Information and Event Monitoring (SIEM) products such as Splunk
- Preferred experience with securing Industrial Control Systems (ICS)
- Experience with DNS security controls
Personal Attributes
- Proven analytical and problem-solving abilities.
- Ability to effectively prioritize and execute tasks in a high-pressure environment.
- Good written, oral, and interpersonal communication skills.
- Ability to conduct research into IT security issues and products as required.
- Ability to present ideas in business-friendly and user-friendly language.
- Highly self motivated and directed.
- Keen attention to detail.
- Team-oriented and skilled in working within a collaborative environment.
- Strong commitment to inclusion and diversity
- 10% travel is required.
- Work outside the standard office 7.5-hour workday may be required with on-call availability.
At Sherwin-Williams, part of our mission is to help our employees and their families live healthier, save smarter and feel better. This starts with a wide range of world-class benefits designed for you. From retirement to health care, from total well-being to your daily commute—it matters to us. A general description of benefits offered can be found at http://www.myswbenefits.com/. Click on “Candidates” to view benefit offerings that you may be eligible for if you are hired as a Sherwin-Williams employee.
Compensation decisions are dependent on the facts and circumstances of each case and will impact where actual compensation may fall within the stated wage range. The wage range listed for this role takes into account the wide range of factors considered in making compensation decisions including skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled.
The wage range, other compensation, and benefits information listed is accurate as of the date of this posting. The Company reserves the right to modify this information at any time, with or without notice, subject to applicable law.
Sherwin-Williams is proud to be an Equal Employment Opportunity/Affirmative Action employer committed to an inclusive and diverse workplace. All qualified candidates will receive consideration for employment and will not be discriminated against based on race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, age, pregnancy, genetic information, creed, marital status or any other consideration prohibited by law or by contract.
As a VEVRAA Federal Contractor, Sherwin-Williams requests state and local employment services delivery systems to provide priority referral of Protected Veterans.