Job Title: Cyber Security Senior Analyst- Smart Grid Internet & Ecommerce - Jackson, MI at Geebo

Job Title: Cyber Security Senior Analyst- Smart Grid

Company Name:
Consumers Energy
Department Summary Performs the most complex analytical tasks associated with IT Infrastructure design and deployment and/or business application development. Tasks are performed in an independent manner with some direction as to the general results expected. This level possesses and applies an in-depth knowledge of principles, practices, and procedures within an IT technology infrastructure or business applications specialization to achieve the completion of more difficult assignments. Tasks may include: -Tasks associated with the identification, deployment, and support of infrastructure technologies to support the company''s business requirements. -Proactively consults with clients. Understands client requirements, articulates business drivers and organizational goals, and understands how their responsibilities support these goals. -Identifies technology options, and defines detailed specifications of technology solutions. -Performs prototyping, design, development, complex configuration testing, debugging, documentation and implementation of mission-critical business systems. -Provides technical expertise and/or leadership on complex projects, including designing application architecture, creating procedures, supporting client training, data conversion and deployment activities, and directing and checking the work of others. -Applies analytical skills to research, study, design, implement, and support complex, large sized projects. Often handles multiple assignments concurrently, leveraging experience and advanced skill in handling complex assignments with little supervision necessary. Coordinates with project managers and team leaders. May function as a team leader or a subject matter expert. In addition, may have supervisory responsibility for employees and have accountability for the team success, as well as career development, performance management, and communication. May represent the journey-level for specific skill areas. Examples of knowledge areas: -Specialized server administration, network, software distribution, and data base technologies, capacity and performance techniques, voice and wireless technologies, internet infrastructure, disaster recovery, and security -Full technical knowledge of the systems development life cycle. Placement at the Senior Lead/Spec. II level requires proficiency in specific market-driven skills that are currently at a higher level in the labor market, due to their special complexity, high demand and/or scarcity. The role of the cyber security senior analyst demands business insight; technical acuity; and the ability to think, communicate and write at various levels of abstraction. All qualified applicants will not be discriminated against and will receive consideration for employment without regard to protected veteran status, disability, race, color, religion, sex or national origin. Job Description/Responsibilities Works closely with enterprise architects, other functional area architects and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements. Specifically, this position will support Consumers Energy's smart energy program relating to AMI, grid modernization and capability expansion. Develops the business, information and technical artifacts that aid in the design and support of the enterprise information security architecture and solutions. Serves as a security expert in application development, database design, network and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Researches, designs, and advocates new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners and vendors. Contributes to the development and maintenance of the information security strategy. Evaluates and develops secure solutions, based on approved security architectures. Analyzes business impact and exposure, based on emerging security threats, vulnerabilities and risks. Communicates security risks and solutions to business partners and IT staff. Strong conceptual thinking and communication skills -- the ability to conceptualize complex business and technical requirements into comprehensible models and templates. Ability to work well under minimal supervision. Team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles, including vendors and IT and business personnel. Demonstrable written and verbal communication skills. This is an expert/lead technical role. It defines the information security architecture and design for the enterprise. This person works on multiple projects as a project leader or as the subject matter expert. The role is involved in projects or issues of high complexity that require in-depth knowledge across multiple technical areas and business segments. Coaching and mentoring of more-junior technical staff will be required. Requirements/Qualifications Requires a bachelor''s degree preferably in an Information Technology field or computer science field. Master''s degree preferred. This role typically has 10 or more years applicable exempt working experience with at least 3 at the BTS Tech Lead/Spec I/II level or the equivalent. Professional security certification, such as a SANS GIAC, Certified Information Systems Security Professional (CISSP) or other similar credentials, is desired. IT and security work experience, with a broad exposure to infrastructure/network and multiplatform environments. Expert knowledge of security issues, techniques and implications across all existing computer platforms. Knowledge of SANS 20 controls framework and other security frameworks (for example, NIST-800 series, NIST IR 7628) All qualified applicants will not be discriminated against and will receive consideration for employment without regard to protected veteran status, disability, race, color, religion, sex or national origin. Experience in using an enterprise architecture methodology (for example, TOGAF, SABSA or Gartner-Burton frameworks). Proven ability in security process and organizational design. Knowledge of real-time systems, control systems, and their interface with business IT solutions. This role will be based out of Jackson, MI and filled at the job level (SG16-SG17) appropriate based on the candidate selected. Company Overview Join a diverse and dynamic team that makes and delivers the most valuable services in the world: electricity and natural gas. At Consumers Energy, our customers are at the heart of everything we do. Our employees work around the clock to provide service to our customers in honor of our history and to fulfill our promise to Michigan - Count on Us! Consumers Energy, the principal subsidiary of CMS Energy and headquartered in Jackson, Michigan, provides natural gas and electricity to nearly 6.8 million of the Michigan''s 10 million residents in all 68 Lower Peninsula counties. All qualified applicants will not be discriminated against and will receive consideration for employment without regard to protected veteran status, disability, race, color, religion, sex or national origin.
Location: Jackson/One Energy Plaza
Requisition #: 50388385
Functional Area: Information Systems / Technology
Apply By: 05/25/2014
Employment Level: Professional (Non-Supervisor)Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.