Cyber Security Analyst
Global Technical Talent, an Inc. 5000 Company
Boise, IDvia LinkedIn
Cyber Security AnalystLocationBoise, IDOnsite FlexibilityHybrid (2-3 days onsite)Contract DetailsPosition Type: ContractContract Duration: 12 months (initial contract with expected renewal)Start: ASAPJob SummaryWith a high degree of latitude, enhance organizational cybersecurity by identifying and addressing security gaps, lead strategic initiatives to address security policies, procedures, and major initiatives. Provides expert-level support across multiple cybersecurity solutions and assesses complex risks. This is a brand-new, high-impact role focused on driving PCI (Payment Card Industry) compliance. The candidate will be responsible for conducting initial GAP analysis, project planning, and the ongoing evolution of the PCI program. This individual must be able to contribute from Day 1.Primary Focus: Driving PCI compliance (not just contributing/auditing).Systems: ArcherKey Tasks: GAP analysis, project planning, and stakeholder management.Key Responsibilities- Serve as a senior information security consultant, leading major initiatives for identifying and mitigating security gaps while providing strategic guidance and support to key organizational areas.
- Direct the advancement of development, refinement, and implementation of security Policies, Standards, and Standard Operating Procedures (SOPs).
- Design and lead information security awareness initiatives within the organization.
- Lead complex security risk assessments, including 3rd party risk assessments, working closely with business partners, vendors, and legal teams to strategically manage and prioritize risks. Oversee the documentation of findings and facilitate informed risk-based decision-making.
- Investigate and resolve complex security events by taking a lead role in the security incident response process and developing others on advanced investigation techniques.
- Manage and optimize daily security operations, monitoring systems and leading the configuration of security tools, while leading vuln