Kohls logo

Information Security Analyst

Kohls
Full-time
Remote
Information Security Analyst

Role Specific Information

Job Description

About the Role

As Information Security Analyst, you will detect, prevent and respond to information threats and security breaches through technical security programs designed to protect the integrity of the organization's networks, systems, applications and data. 

 

What You’ll Do

  • Maintain information security policies and coordinate company-wide information security controls 

  • Conduct information security audits and analyses and regularly drive solutions and actionable deliverables

  • Resolve routine security incidents and audits

  • Proactively monitor, evaluate and maintain systems and procedures that safeguard internal information systems, networks, databases and Web-based security

  • Recommend and implement changes to enhance systems security and prevent unauthorized access

  • Educate and communicate security requirements and procedures to users

  • Monitor and research new and emerging threats and stay current on information security websites

  • Interpret vulnerability scan data to prioritize risks

  • Assist in software, hardware and service evaluations, security audits, security risk assessments and the administration of compliance with regulations and privacy laws

  • Additional tasks may be assigned

 

Addendum

 

Governance, Risk and Compliance (GRC) Service: 

  • Demonstrate knowledge of compliance program initiatives, including control requirements and associated risks, and how Kohl’s meets them

  • Document security issues, including identifying risks and working with issue owners to define and validate remediation plans

  • Support security awareness programs, including preparation of materials, education of associates and program performance monitoring

  • Support third-party vendor security risk management program and life cycle

  • Perform application access reviews to support identity governance program and compliance requirements

  • Serve as a subject matter expert for Information Security to technical/non-technical management and associates

  • Facilitate communication with product teams on remediation prioritization and timelines

  • Apply relevant industry trends to product needs

  • Identify mitigation strategies for remediation

 

Vulnerability Management:

  • Perform vulnerability risk assessments and communicate results to partner teams

  • Monitor industry vulnerability notices and threat intelligence and prioritize vulnerabilities discovered 

  • Facilitate communication with product teams on remediation prioritization and timelines

  • Demonstrate technical knowledge of common operating systems, databases, applications and cloud platforms and how vulnerability can impact each

  • Demonstrate technical depth and knowledge of Kohl’s vulnerability management technologies

  • Implement low-impact vulnerability scan policies and consult on the design of vulnerability-related security solutions or processes

  • Understand relationship of metrics to vulnerability strategy

 

Identity and Access Management:

  • Work with an offshore team to maintain the SLAs and identify ways to improve operational efficiency

  • Create and maintain metrics associated with user access administration

  • Develop, solicit and maintain all appropriate documentation for all workflows

  • Drive processes, understand access requirements and develop role models and standards for IAM processes

  • Capture user identity administration exceptions and determine and document the course of action for resolution

  • Identify and define mitigation plans for risks and issues related to project timeline, resources or quality

  • Provide IAM process guidance and requirements, create IAM solutions and create roles for application onboarding

 

Consulting:

  • Work with teams to provide written and actionable deliverables, including write-ups, supporting architectural diagrams and defects that help teams design and deploy secure solutions in concert with InfoSec services and technology

  • Understand major interconnected systems and document security controls and gaps in component applications 

  • Work with teams to help them understand product-specific expectations and recommendations and to help prioritize risk and effort-adjusted work 

  • Suggest policy, standard and requirements improvements

  • Serve as an architectural voice of security in initiatives and team planning

 

Incident/Response:

  • Monitor, detect and analyze potential intrusions in real-time and through historical trending on security-relevant data sources

  • Respond to confirmed incidents, coordinate resources and direct the use of timely and appropriate countermeasures

  • Create detailed incident write-ups 

  • Participate in security audits and security risk assessments

 

What Skills You Have

  • Ability to work independently and as part of a product team

  • Ability to collect data and derive risk posture

  • Understanding of penetration testing, configuration hardening, and vulnerability management

  • Knowledge of hacker tactics, techniques and procedures

  • Strong interpersonal and communication skills with the ability to interact with technical SMEs and business stakeholders

 

Preferred

  • Technology security experience

  • Data analyst skillset


 

Essential Functions

The requirements listed below are representative of functions you will be required to perform, however you may be required to perform additional functions. Kohl’s may revise this job description at any time. To perform this job successfully, you must be able to perform each essential function satisfactorily. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions, absent undue hardship.

  • Ability to perform the accountabilities listed in the “What You’ll Do” Section

  • Ability to comply with dress code requirements

  • Basic math and reading skills, legible handwriting, and basic computer operation

  • Ability to maintain prompt and regular attendance and meet scheduling requirements as set by the company

  • Ability to learn and comply with all company policies, procedures, standards and guidelines

  • Ability to give direction and to receive, understand and proactively respond to direction from leadership and other company personnel

  • Ability to work as part of a team and interact effectively and appropriately with others

  • Ability to maintain composure and work in a fast paced environment while accomplishing multiple tasks within established timeframes

  • Ability to satisfactorily complete company training programs

  • Ability to use a personal computer for tasks such as communicating, preparing reports, etc.

  • Ability to plan, prioritize and monitor activities across business units

  • Ability to complete or oversee the completion of assigned projects in a timely manner