Sign In

 

 

 

Technical Analyst IT - Cyber SecurityTechnical Analyst IT - Cyber SecurityFalseFalse213890https://exeloncorp.taleo.net/careersection/exelon_external/jobdetail.ftl?job=213890, https://exeloncorp.taleo.net/careersection/exelon_external/jobdetail.ftl?job=213890<p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><strong>PRIMARY PURPOSE OF POSITION:</strong></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"> </p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">Provide deep technical expertise to support delivery and maintenance of IT solutions. Cyber Security Professional (CSP) partners with IT and business teams to provide expert leadership to drive security technology and security reference architecture solutions by weighing the advantages of security technology standards, market availability of products, and risks and benefits of security technology introduction into Exelon�s computing environments.   </p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"> </p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">Provides comprehensive consultation to business units and IT management and staff at the highest technical level for all aspects of the security. The Cyber Security Professional (CSP) develops and maintains business, systems, and IT/OT processes to support enterprise mission needs and requirements; translates technology and environmental conditions (e. g. , law and regulation) into IT/OT rules and requirements that describe baseline and target security architectures. The CSP designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e. g. , law and regulation) into security designs and processes.     Expected to work under minimal supervision. </p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"> </p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><strong> PRIMARY DUTIES AND ACCOUNTABILITIES: </strong><br></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">- Provide technical and security expertise to IT and business teams to identify security technology solutions and develop security reference architectures and strategies to achieve business results.   Ensure appropriate implementation of security technology and reference architectures within both the development and production environments.   Analyze user needs and requirements to plan architecture. <br></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">- Design and develop enterprise-wide security architecture and strategy for all aspects of the security domain in alignment with the business strategy and goals. Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements.    Provide input on security requirements to be included in statements of work and other appropriate procurement documents. Identify and provide Business and IT data on IT trends and issues. Participate in IT architecture review and standards setting. Assist in the development of white papers, conducting presentations as needed to explain why a technology is being recommended by IT. <br></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">- Provide technical guidance and security expertise in the areas of secure application development, security architecture risk management and assessment, security policies and standards, security architectures and implementations.   Maintain technical knowledge and business acumen within own discipline or function<br></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">- Provide technology and security expertise and advice to IT leadership in the development of strategic security technology and plans to support business strategies.   Translate proposed capabilities into technical requirements. <br></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">- Establish, maintain, and enhance relationships with business and IT partners.   Communicate status to key stakeholders on a regular basis. <br></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">- Maintain awareness of trends and issues in area of security expertise, evaluate new security technologies or technology opportunities, and provide analysis of their potential impact to advantage the business. </p>