The Sherwin-Williams Company
IT Security Analyst, Vulnerability Management
The Sherwin-Williams Company, Cleveland, Ohio, us, 44101
The IT Security Analyst, ICS/OT Vulnerability Management performs two core functions for the enterprise. The first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation and resolution of security concerns detected by those systems. Key focus areas for this position include supporting Industrial Control Systems/Operational Technology (ICS/OT) Vulnerability Management tools and configurations for the ICS/OT environments. Secondary tasks may include the development and/or implementation of security solutions, which fit into the S-W security architecture. The IT Security Analyst, ICS/OT Vulnerability is expected to be fully aware of the enterprise's security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals. Strategy & Planning Participate in the planning and designing of enterprise ICS/OT vulnerability management architecture, under the direction of the IT Security Manager, where appropriate. Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures) under the direction of the IT Security Manager, where appropriate. Assist in developing and communicating policies, procedures, and plans to management team, staff, partners, customers, and stakeholders regarding technology and industry-specific laws. Stay abreast of emerging cybersecurity threats, technologies, and trends, evaluating their potential impact on organizational security posture. Acquisition & Deployment Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with industry standard best practices and the enterprise's specific security policies and standards. Maintain up-to-date detailed knowledge of the in-place security solutions including awareness of new or revised functions and improved processes. Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security. Operational Management Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. security tools) or not (i.e., workstations, servers, network devices, etc.). Maintain operational configurations of all in-place security solutions (such as active or passive vulnerability scanning tools) as per the established baselines. Monitor all in-place security solutions for efficient and appropriate operations. Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution. Participate in investigations into problematic activity and escalate to the Security Operations Center for assistance as needed. Provide on-call support for end users for all in-place security solutions. Collaborate with IT, security, human resources, and legal to ensure full legal compliance of company policies, procedures, forms, notices, and materials. Advocate company's compliance policies via regular written and in-person communications. Ensure that information security measures and equipment adhere to all applicable laws and regulations. Incidental Functions Monitor security systems and analyze potential threats and vulnerabilities to infrastructure and applications throughout the environment, with a focus on ICS/OT environments in the manufacturing space. Assist in the analysis of security events and alerts to assess, prioritize and differentiate between vulnerabilities, potential intrusion attempts and false alarms. Assist with other projects as may be required to contribute to efficiency and effectiv