Located at our manufacturing facility in Danbury, CT and reporting to the Sr. Manager, Information Security & Infrastructure, the Information Security Analyst is a hands-on role responsible for the security of all MannKind data including on premise and cloud applications. Follows through on technical issues until closure. Your expertise with the Center for Internet Security (CIS) Controls framework and artificial intelligence (AI) will be crucial in identifying vulnerabilities and mitigating ris... more details
At MannKind our employees are our number one asset, and we continue to be a tight-knit community where each of us has a critical role in our success. Committed to diversity, at MannKind we depend on a rich blend of ideas, backgrounds, and working styles in our quest to change the world for the better.
Position Summary:
Located at our manufacturing facility in Danbury, CT and reporting to the Sr. Manager, Information Security & Infrastructure, the Information Security Analyst is a hands-on role responsible for the security of all MannKind data including on premise and cloud applications. Follows through on technical issues until closure. Your expertise with the Center for Internet Security (CIS) Controls framework and artificial intelligence (AI) will be crucial in identifying vulnerabilities and mitigating risks.
Principal Responsibilities:
Implement and maintain cybersecurity measures in accordance with the CIS Controls framework
Conduct regular system audits to ensure compliance with security standards
Utilize AI-driven security tools to detect and respond to threats in real-time
Collaborate with IT teams to integrate security practices into the development lifecycle
Provide training and guidance to IT staff on cybersecurity best practices
Stay abreast of the latest cybersecurity trends and technologies
Assist with updating and reviewing SSP (System Security Plan)
Develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, remediation as well as advises on configuration for a variety of security tools.
Triage, evaluate, categorize, and resolve security events before they become security incidents
Collaborating with and educating other teams on raising the bar for security across the organization
Coordinating with outside vendors to ensure secure operations
Identify security gaps discovered through ongoing monitoring of all information security controls and propose enhancements to security controls.
Evaluate and/or propose cybersecurity solutions and controls to maintain confidentiality, integrity, and availability.
Compile weekly, monthly and quarterly metrics and reporting with regard to the current state of information security program and specific projects/activities
Participates in cybersecurity projects to ensure that the delivery is on-time and adopted to meet the company's information protection requirements
Coordinate companys phishing campaign program
Maintain relationship with Managed Security Services Provider
Education and Experience Qualifications:
BA/BS degree relating to information technology, compliance, information management, and/or information security and a minimum of 5 year's work experience.
Candidates must possess analytical skills, which evolved from training in Cybersecurity, Information Systems, Computer Science, or similar discipline.
Experience managing Rapid7.
Hands on experience running AI models.
Experience with information security framework models such as CIS Framework, NIST, etc., implementing and auditing security measures, security response, and incident management.
Working knowledge of network switches, routers, firewalls and VPN, network security, administration of DLP, antivirus, antimalware, IDSIPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs.
Knowledgeable in security best practices such as encryption, hashing, vulnerability scans, event log monitoring, intrusion detection and prevention, eDiscovery, and content filtering.
Ability to oversee, resolve, and consistently enhance the vulnerability management program
Ability to propose solutions for closing identified vulnerabilities.
Knowledge of cloud providers' security (AWS, Google Cloud Platform, or Azure).
Prior experience managing DNS filtering technologies, EDR solutions
Prior experience with SIEM, configuration management, hardening, and vulnerability scanning
Experience with identity access management systems (IDaaS)
Previous experience in a HIPAA and FDA regulated environment preferred.
Job Abstracts is an independent Job Search Engine. Job Abstracts is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Job Abstracts uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder. Job Abstracts does not have its members apply for a job on the jobabstracts.com website. Additionally, Job Abstracts may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.
We would like to take a second to Welcome You to Job Abstracts, the nation’s largest Pure Job Board. With over 3.1 million job listings from 15,000+ Companies & Organizations, we help job searchers find careers that match their interests. As an anonymous user, you have probably discovered how easy our system is to use. However, you have just scratched the surface of what we can offer.
We encourage you to Register so you can use our most powerful features: searching with multiple terms, setting up multiple locations, establishing favorite companies, and accessing your search history. If you find a job you like, you can apply directly for it, and then, keep notes on it. We will also keep a lookout for jobs that match your search terms and email you when we find something you may like.
You can register for free and the system is free to use. If you like our system so far, click on Register and unlock the power required by serious job searchers.
Any time you conduct a search, the system shows you job matches, ranked by their Relevance Score (RS).
The score is calculated by a proprietary algorithm that uses Intelligent Machine Learning.
The Relevance Score tells you how well the job opportunity matches your search term or terms.
When not logged in, the system is limited to one search term. Scores for single term matches are usually lower.
When you register, log in, and set up multiple terms prioritized by importance, the jobs found for you will receive a much higher Relevance Score.