Security Analyst II

Posted on April 25, 2025

Location

Remote (WI Residency Required)
142112

Position Details

Full-Time

Job Summary

Beacon Technologies is seeking a Security Analyst II for our client partner. Under the general supervision of the Security Audit and Compliance Section Chief / Deputy CISO, this position provides technical guidance, special analyses and consulting services on the operations and adequacy of security controls and compliance with federal and state regulations. The position requires 4-7 years of experience, familiar with standard security concepts, practices, and procedures. Relies on limited experience and judgment to plan and accomplish goals. A certain degree of creativity and latitude is required. In addition, this position requires strong communications skills, both verbally and in writing, provides excellent customer service and consulting to internal and external stakeholders, and the ability to work with cross-functional teams.

This position is responsible for:

  • Reporting on whether electronic information systems are effectively managed and controlled.
  • Assessing whether the application and general computer controls are adequate and functioning as intended, especially in the area of privacy and security.
  • Recommending and, as appropriate, assisting in documenting improvements to existing or design-stage information systems to increase efficiency or adequacy of controls.
  • Evaluating the adequacy of policies and procedures related to the effective operation and control of the information systems.
  • Facilitating development of responses to external audit findings and the resolution of IT policy and procedural issues.
  • Ensuring compliance with regulatory and other industry standards for infrastructure services.

Goals and Worker Activities:

  • 40% - Provision of technical guidance on IT audit, security, and compliance requirements
  • Research, review and keep current on federal and state regulatory compliance requirements and security best practices.
  • Maintain contacts and productive relations with IT managers and staff as a means of providing assistance with audit and compliance needs and areas of potential risk.
  • Provide technical guidance, as requested, to department managers in appropriate IT areas, such as development and implementation of internal control systems; development of policies and procedures; establishing benchmarks to measure the effectiveness of an IT application or function; and enhancing security features governing access to applications, IT Infrastructure (e.g., servers, firewall, LAN/WAN, databases, etc.) and physical IT operations.
  • Identify audit topics that should be considered for audit or limited review, based on indicators of any significant system changes, risks faced by the department and/or possible benefits of conducting such assessments.
  • Assist department and agency managers in developing responses to audits by external (state and federal) auditors, and in tracking responses to ensure that corrective actions are taken.
  • Plan and conduct follow-up reviews to determine whether recommendations have been implemented to adequately address the findings.
  • Focus on IT systems issues, functions or activities when identifying risks facing the department and potential audits issues, such as management controls, applications, IT operations and data management.
  • Perform research and analysis and provide feedback on physical security of the data centers as requested.
  • 40% - Administration of the documentation, communication, and assessment of the adequacy of security controls for information systems
  • Participate in meetings with agency customers to review and understand their requirements as they relate to enterprise security. Develop plans to raise security awareness.
  • Perform appropriate tests of general IT controls and specific application controls to verify that controls being audited are functioning as intended.
  • Recommend to management changes that are necessary to improve the design and operating effectiveness IT security controls.
  • Draft correspondence, finding sheets and audit reports that clearly explain the findings and conditions disclosed during the audit, the basis for the audit conclusions and specific recommendations for corrective action. Participate in discussions related to the IT audit findings and potential recommendations.
  • Review assessments or Service Organization Controls (SOC) reports of business associates and provide guidance to program areas on how they can use these to monitor the operations that are outsourced.
  • Develop an audit or limited review work plan detailing specific audit objectives, audit tasks to be performed, the criteria to be used in assessing whether the IT system, function or activity being reviewed is performing effectively, and the timelines for completing planned tasks.
  • Track, monitor, review IT findings within the audit reports and provide guidance to agency staff, technical infrastructure staff and program areas on risks and remediation plan adequacy.
  • Meet with agency customers to understand their security requirements and recommend alternatives that relate to the enterprise shared IT Infrastructure systems security strategies.
  • Participate on enterprise incident response teams working on security related issues.
  • Investigate security and compliance related issues for the enterprise and agencies as requested.
  • 20% - Performance of information technology security initiatives
  • Participate on cross-functional teams in needs assessment, design, or implementation projects to address security audit and compliance needs.
  • Review internal project study requests and project plans for compliance with IT security strategic goals.
  • Evaluate customer requirements to determine if security solutions meet federal and state audit and compliance controls. Provide cost-benefit analyses as needed and solicit funding to develop and implement new projects and services.
  • Provide information technology security expertise to system developers, system administrators, project managers and other IT professionals to ensure adequate security controls in IT systems.
  • Recommend methods and technologies to improve management of the security infrastructure, its efficiency, and its effectiveness.

Knowledge, Skills and Abilities:

  • Ability to deliver quality service and maintain positive working relationships with customers.
  • Ability to function as a team member, including the open sharing of information, and willingness to help wherever needed.
  • Ability to communicate clearly and effectively to both technical peers and less technical customers in person and via written media such as email, reports, and project charters.
  • Knowledge of and ability to apply IT service-delivery management best practices and procedures.
  • Ability to learn quickly; synthesize complex information, identify key points and communicate results accurately and effectively.
  • Considerable knowledge and skill in standard audit procedures, including preparing an audit guide and identifying the steps taken in conducting the audit.
  • Considerable knowledge of information technology controls.
  • Considerable skill and experience in IT systems, software, and web-based applications.
  • Considerable knowledge of regulatory compliance requirements and assessment processes.
  • Considerable knowledge of security concepts, risk management and investigation techniques.
  • Knowledge of practices of the Information Systems Audit and Control Association or any other applicable background for the audit of information systems.
  • Considerable skill in writing technical, management and analysis reports and papers.

 

About Beacon Technologies

Are you looking to advance your career in information technology? Beacon Technologies offers career advancement opportunities, extensive training, and excellent benefits including paying for health and dental premiums for salaried employees. In addition to providing interesting opportunities, Beacon Technologies provides that old fashioned, personal touch, so you feel like a part of the Beacon team.

Beacon Technologies, Inc. is an equal employment opportunity employer with a functioning Affirmative Action Plan. It is the policy of Beacon Technologies, Inc. to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, religion, sex, sexual orientation, gender identity or expression, age, disability, marital status, citizenship, national origin, genetic information, ethnicity, ancestry, disability, medical condition, military and veteran status, or any other characteristic protected by law. Beacon Technologies, Inc. prohibits any such discrimination or harassment.