Senior Information Security Analyst Information Technology (IT) - Irvine, CA at Geebo

Senior Information Security Analyst

Western Digital is an industry-leading provider of storage technologies and solutions that enable people to create, leverage, experience and preserve data. The company addresses ever-changing market needs by providing a full portfolio of compelling, high-quality storage solutions with customer-focused innovation, high efficiency, flexibility and speed. Our products are marketed under the HGST, SanDisk and WD brands to OEMs, distributors, resellers, cloud infrastructure providers and consumers.
We're looking for a Senior Information SecurityAnalyst with extensive knowledge and experience in multiple technical andadministrative domains who will engage in architecture and solution developmentwith all peer IT organizations, product engineering, and global manufacturing.
The Western Digital InformationSecurity organization is seeking a well-rounded security practitioner withbalanced technical, process, and communication skills. This position willbe responsible for the security assessment of information technology solutionsthat are either currently deployed or planned for design or deployment. The solutions may be part of the formal IT-managed environment, critical areasof product manufacturing, or systems and workflows within productengineering. Broad knowledge of security principles must be combined witha practical understanding of computing systems across multiple operatingsystems, data storage, network controls, and fundamental infrastructure that'stypical within large global enterprises.
Because all engagementswill require a close partnership with professionals across IT and relevantbusiness functions, this position requires strong interpersonal skills alongwith outstanding verbal and written communication skills. In addition toproviding assessment results, this role consult with the business owners toaddress any security concerns that may need remediation. This may resultin the design of new solutions. There will also be opportunities toperform security assessments of third party SaaS products, general cloudservices proposed for activation, or posture checks of third party businesspartners who could be granted the ability to retain Western Digitalintellectual property assets.
Strong knowledge of computeroperating systems including Windows, Mac, and Linux
Fundamental knowledge of VMwareand infrastructure virtualization
Fundamental knowledge of datastorage systems and delivery protocols
Strong knowledge of fundamentalnetworking controls including L3 and L7 firewalls
Strong knowledge of securityprinciples in all areas of IT infrastructure and workflows
Proven ability to conductsecurity assessments of internal and external solutions
Proven ability to authorconsumable reports of security findings
Proven ability to authorsecurity policy documents
Excellent interpersonal andprofessional relationship skills
Outstanding verbal and writtencommunication skills
Experience with software andhardware product engineering workflows
Experience with technologyproduct manufacturing systems and workflows
Understanding of infrastructurehardening requirements and implementation
Advanced education intechnology such as Computer Science or Information Security
CISSP certification
CISA certification
HGST is an Equal Opportunity and Affirmative Action Employer. We makeemployment decisions without regard to race, color, religion, sex, nationalorigin, veteran status, disability status, pregnancy, or any other basisprotected by federal, state or local law. #LI-BG1
. Apply now!Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.