The successful candidate in this role will support their supervisor with tracking adherence to the ISMS, validating the integrity of security controls, helping on security projects and ensuring audit readiness. The candidate will assist with assessing technical operations and processes to document necessary security controls. Working with their supervisor, the resource will communicate with associates regarding security awareness and security alerts. Recommend updated security controls and document processes to meet compliance requirements.
This role can be located almost anywhere in the U.S.
What You Will Do:
May own low to moderate complexity assignments
Provides daily job tasks with oversight of teammates.
Interrupt assessment requirements (controls) and how they relate to the technology being assessed.
Operate following daily job tasks as directed by the supervisor or the Chief Security Officer.
Work with the supervisor to assess technical and policy security requirements across projects and other assessments.
Once trained, provide guidance to internal team members on what evidence is needed to satisfy findings or audits.
Moderate ability to understand the “big picture” view.
Trains with teammates on areas of policy, industry standards, concepts, best practices, controls, processes and procedures.
Track quarterly access reviews and report non-compliance
What You Will Have:
Exhibits an inquisitive mindset (questions the how's/why's, proactive, process improvement, etc.)
Knowledge of information security standards and regulations (SOX, SOC, PCI, ISO, HITRUST, NIST CSF frameworks, etc.) is preferred
Understanding of audit types (external, internal, operational, information system, etc.), practices (best practices, efficiency and effectiveness, policies and procedures, securing assets, segregation of duties, review and approval, etc.) and controls (environment, risk, activities, information and communication, monitoring, etc.)
Proficient in Microsoft Word, Excel and Outlook programs
Bachelor's degree with no experience; or equivalent work experience
Proficient communication skills (verbal, written)
Ability to employ time management effectively
Ability to identify areas of urgency and prioritize tasks effectively
Drives good teaming and partnership skills within and outside organization
Understanding of general technology (Windows, Linux, networks, firewalls, etc.).
Ability to understand vulnerability scanning methodologies, secure software development lifecycle and different elements of defense in depth concept.
What Will Set You Apart:
Functional knowledge of Information Assurance
Understanding of general technology (Windows, Linux, etc.)
Utilization of ServiceNow, SharePoint, JIRA, Confluence, Lucid Chart, etc.
Acxiom is an affirmative action and equal opportunity employer (AA/EOE/W/M/Vet/Disabled) and does not discriminate in recruiting, hiring, training, promotion or other employment of associates or the awarding of subcontracts because of a person's race, color, sex, age, religion, national origin, protected veteran, military status, physical or mental disability, sexual orientation, gender identity or expression, genetics or other protected status.
Acxiom is a customer intelligence company that provides data-driven solutions to enable the world’s best marketers to better understand their customers to create better experiences and business growth. A leader in customer data management, identity, and the ethical use of data for more than 50 years, Acxiom now helps thousands of clients and partners around the globe work together to create millions of better customer experiences, every day.